Across
- 4. A type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
- 8. An individual who uses computers, networking, or other skills to overcome a technical problem, often used in the context of someone who gains unauthorized access to systems.
- 9. The act of disguising communication from an unknown source as being from a known, trusted source. Spoofing can apply to emails, phone calls, websites, etc.
- 11. A list of entities approved for authorized access or privileged membership in cyberspace often contrasted with blacklist which identifies entities denied access privileges
- 12. A number of Internet-connected devices, each running one or more bots. Botnets can be used to perform distributed denial-of-service attacks (DDoS), steal data, send spam, and allow the attacker to access the device and its connection.
- 13. An incident where data is unintentionally exposed in a vulnerable system or stolen outright.
- 15. A piece of software, chunk of data, or sequence of commands that takes advantage of a bug or vulnerability to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic (usually computerized).
- 17. In cybersecurity context, this refers to any physical device used for security purposes like authentication tokens which store digital credentials for logging into systems securely.
- 19. A type of malware that misleads users of its true intent, often disguised as legitimate software.
- 20. A type of surveillance technology used to monitor and record each keystroke typed on a specific computer's keyboard.
- 22. A function that converts an input (or 'message') into a fixed-length string of bytes. Hash functions are used in various applications including digital signatures and password storage.
- 25. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
- 28. Virtual Private Network; extends a private network across public networks like the Internet enabling users to send and receive data as if their devices were directly connected to the private network while benefiting from its functionality and security policies.
- 30. A collection of software tools that enable an unauthorized user to gain control over a computer system without being detected.
- 31. The process of converting information or data into a code to prevent unauthorized access.
- 33. The process of verifying the identity of a user or device, often as a prerequisite to allowing access to resources in an information system.
Down
- 1. The act of intercepting and monitoring traffic passing through a digital network.
- 2. A type of attack where the attacker supplies untrusted input into a program. This input is then processed by an interpreter as part of a command or query thereby altering the course of execution of the program.
- 3. The isolation of data files suspected of being infected with malware so they cannot harm your system while you decide whether they should be deleted.
- 5. Distributed Denial of Service; an attack meant to disrupt normal traffic of a targeted server, service, or network by overwhelming it with a flood of Internet traffic from multiple sources.
- 6. A method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (root access) on a computer system, network, or software application.
- 7. Secure Sockets Layer / Transport Layer Security; cryptographic protocols designed to provide communications security over a computer network.
- 10. An algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.
- 14. Malicious software designed to block access to a computer system until a sum of money is paid.
- 16. An intermediary server separating end users from the websites they browse. Proxy servers provide varying levels of functionality, security, and privacy depending on your needs.
- 18. A piece of software designed to update or fix problems with a computer program or its supporting data. This includes fixing security vulnerabilities and other bugs.
- 21. The fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communications.
- 23. A security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading.
- 24. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 26. Criminal activities carried out by means of computers or the Internet.
- 27. A standalone malware computer program that replicates itself in order to spread to other computers.
- 29. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 32. Multi-Factor Authentication; an authentication method that requires two or more independent credentials for more secure verification.
