Security+ Questions 1

12345678910111213
Across
  1. 2. An attack that exploits a potentially serious software security weakness that the vendor or developer may be unaware of
  2. 4. A function that converts an input (or 'message') into a fixed-size string of bytes, typically a digest that is unique to each unique input. It is used in various security processes to ensure data integrity
  3. 7. A type of control that are designed to prevent an attacker from attempting to violate security policies
  4. 8. Procedural mechanisms that focus on the mechanics of the risk management process
  5. 10. functions or codes that are placed inside of other programs that will activate when set conditions are met instead of independent malicious programs
  6. 11. Groups of remotely controlled systems that are used by attackers who control them to perform various actions such as additional infections and denial of service attacks
  7. 12. Malware that takes over a computer then demands a ransom or payment
  8. 13. Malware that is specifically designed to allow attackers to access a system through a backdoor
Down
  1. 1. A cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
  2. 3. The process of converting information or data into a code, especially to prevent unauthorized access. It secures data by making it unreadable without the proper decryption key
  3. 5. Programs that capture keystrokes from keyboards, mouse movement, touchscreen inputs, or credit card swipes from attached devices
  4. 6. Methods or tools that provide access that bypasses normal authentication and authorization procedures, allowing attackers access to systems, devices, or applications
  5. 9. A term that describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users