Across
- 2. Deceptive computer program that appears to be legit.
- 4. Ensures that only authorized users can access certain data or resources while maintaining privacy, and preventing data breaches.
- 7. Manipulation of individuals into divulging confidential information.
- 8. A network of computers used to perform malicious activities.
- 11. A weakness in a computer system, or network that can be exploited.
- 13. Type of attack where attackers overwhelm a target system or network.
- 17. Redirecting legitimate website traffic to fake websites without the user's knowledge.
- 18. Type of malware that holds a user's files hostage and demands something in return.
- 19. A hidden entry point into a computer system, usually created by the developer.
- 20. A malicious software program that self-replicates without human intervention.
Down
- 1. A company that provides users with access to the internet.
- 3. Authorized users can access information or services whenever needed.
- 5. Using hacking to promote a political cause.
- 6. Disguising communication from an unknown source.For example, forging senders email address.
- 9. Requires users to provide multiple forms of identification before gaining access to a system.
- 10. Process of converting plaintext data into ciphertext to secure from unauthorized access.
- 12. The assurance that data remains accurate, consistent, and unaltered.
- 14. A malicious software program that replicates itself with human intervention.
- 15. Attackers impersonate trustworthy entities, usually through emails.
- 16. Malicious software that secretly monitors a user's activity.
