Security-04-30-2024

1234567891011121314151617181920
Across
  1. 3. ______ engineering is the act of tricking a person into doing something by messing up their emotions and decision-making process
  2. 10. A type of attack where malicious code is inserted into a database query.
  3. 14. The process of verifying the identity of a user or device
  4. 16. A transformation of data into a form that conceals the data's original meaning.
  5. 18. A hidden way to access a system or software.
  6. 19. The practice of concealing messages or information within other nonsecret text or data
  7. 20. A logical or physical discontinuity in a network to prevent unauthorized access.
Down
  1. 1. A network of infected computers controlled by a hacker.
  2. 2. A phishing attack conducted through SMS messages.
  3. 4. Detection technology software to shield users against malware.
  4. 5. A vulnerability that is exploited before the software developer releases a fix.
  5. 6. A generic term for different types of malicious code
  6. 7. An isolated environment used to test potentially dangerous software.
  7. 8. A deceptive system designed to attract and monitor unauthorized access or attacks.
  8. 9. A type of phishing attack carried out through voice calls.
  9. 11. An attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
  10. 12. Developing audio, image, or a video clip that has been edited and manipulated to appear real or believable
  11. 13. A software update that fixes vulnerabilities or bugs.
  12. 15. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function
  13. 17. Use of e-mails that appear legitimate to trick a user into entering valid credentials or clicking a link.