Across
- 3. The individual or entity that is responsible for an attack.
- 5. Software that infects a computer with malware
- 7. Malicious program that uses a computer to replicate
- 11. Making something unintelligible
- 12. Circumventing the installed built-in limitations on Apple iOS devices
- 13. Only authorized parties can view information
- 16. The means of persuading or convincing a user in order to gain information
- 18. Software or hardware that silently captures all keystrokes taken on a computers keyboard. A form of spyware
- 21. Digital platform that threat actors target for their exploits
Down
- 1. A secret combination of letters, numbers, and/or characters that only the user should have knowledge of
- 2. Obfuscation of sensitive data elements into a random string of characters.
- 4. False or inaccurate information that is designed to mislead with malicious intent.
- 6. An attack for which there are zero days of warning, and no immediate fix is known
- 8. Only authorized parties can change information
- 9. A container in which an application is allowed to run without impacting the underlying OS
- 10. Downloading unofficial and unapproved apps
- 14. An executable program that pretends to be perform normal activities but secretly is doing something malicious
- 15. An employee or worker from within an organization that poses a threat
- 17. Registering domain names of sites that are spelled close to the actual and legitimate sites
- 19. Malware that has the ability to hide its presence and the presence of other malware on a system
- 20. Installing software security updates.
