Across
- 3. ______ engineering is the act of tricking a person into doing something by messing up their emotions and decision-making process
- 10. A type of attack where malicious code is inserted into a database query.
- 14. The process of verifying the identity of a user or device
- 16. A transformation of data into a form that conceals the data's original meaning.
- 18. A hidden way to access a system or software.
- 19. The practice of concealing messages or information within other nonsecret text or data
- 20. A logical or physical discontinuity in a network to prevent unauthorized access.
Down
- 1. A network of infected computers controlled by a hacker.
- 2. A phishing attack conducted through SMS messages.
- 4. Detection technology software to shield users against malware.
- 5. A vulnerability that is exploited before the software developer releases a fix.
- 6. A generic term for different types of malicious code
- 7. An isolated environment used to test potentially dangerous software.
- 8. A deceptive system designed to attract and monitor unauthorized access or attacks.
- 9. A type of phishing attack carried out through voice calls.
- 11. An attempt by an unauthorized entity to gain access to a system by posing as an authorized user.
- 12. Developing audio, image, or a video clip that has been edited and manipulated to appear real or believable
- 13. A software update that fixes vulnerabilities or bugs.
- 15. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function
- 17. Use of e-mails that appear legitimate to trick a user into entering valid credentials or clicking a link.
