RU ITEC411 chapter 5

123456789101112131415161718192021222324
Across
  1. 4. A hidden way to get into a system later
  2. 6. A system that blocks unwanted network access
  3. 8. Proving a user is who they say they are
  4. 10. A hacker who helps improve security
  5. 11. An attack that overloads a website so it stops working
  6. 13. A hacker who is somewhere in between good and bad
  7. 14. Getting into a computer system without permission
  8. 15. Software that secretly watches what a user does
  9. 19. Important systems like power or hospitals that must stay running
  10. 20. Fake messages used to trick people into giving information
  11. 22. A group of infected devices controlled by a hacker
  12. 23. A program that spreads by attaching itself to other files
  13. 24. A weakness in a system that can be exploited
Down
  1. 1. Protecting systems, networks, and data from attacks
  2. 2. Scrambling data so only authorized users can read it
  3. 3. Harmful software made to damage or steal data
  4. 5. A group that responds to cybersecurity emergencies
  5. 7. Tricking people into giving access or information
  6. 9. Using body features like fingerprints for security
  7. 10. A program that spreads on its own through networks
  8. 12. Software that locks files and demands money to unlock them
  9. 16. A hacker who breaks the law and causes harm
  10. 17. Hacking to support a political or social cause
  11. 18. Software that looks safe but secretly does something harmful
  12. 20. A software update that fixes security problems
  13. 21. Using someone else’s personal information for fraud