Across
- 2. A form of malware that when executed, changes, corrupts, or destroys information in a system, then it passes on to other systems and damages those as well
- 5. A network of computers that have been infected with a virus and now continuously work to create security breaches
- 8. A hacking strategy that relies on user manipulation and exploiting human psychology to carry out attacks (two words)
- 11. A form of malware that hijacks your system, encrypts your files, and denies you access until you send a payment to unlock them
- 13. Threat detection technology designed to shield users from viruses, spyware, trojans, and worms (two words)
- 15. A form of ethical hacking that simulates a cyberattack to look for weaknesses that malicious actors may be able to exploit (two words)
- 19. A part of the computer system designed to block unauthorized access and keep intruders out
- 20. A term for a wide variety of malicious software used to infect and/or damage systems
- 22. The use of unique biological features for digital authentication and access control
- 23. Protection from potential harm caused by others
- 24. An acronym for a tool that gives a user privacy and anonymity online by connecting to a secure server
- 25. Use this to access resources, software, and databases over the Internet and outside the confines of local hardware restrictions
Down
- 1. A type of scam where a threat actor poses as a legitimate business or organization in order to trick a victim into clicking on a malicious link or attachment
- 3. When a hacker changes the email address or Wi-Fi network name so that it appears to be a trusted source
- 4. Someone who uses their information technology knowledge and skill to gain unauthorized access to computers, systems, and data
- 6. Converting raw data, known as plaintext, into a code, known as ciphertext, to prevent hackers from being able to understand it if they gain access to it
- 7. A group of applications that instruct a computer to carry out a task
- 9. Occurs when a hacker successfully breaks into a system, takes control of a network, or exposes personal information (two words)
- 10. A piece of audio or video that has been altered to make it seem authentic, often used maliciously to spread false information
- 12. An acronym for an authentication tool that requires a combination of two or more credentials to verify a user’s identity for login
- 14. A form of malware that replicates itself in order to spread to other computers
- 16. A code that takes advantage of a software vulnerability or flaw
- 17. A form of malware that throws up unwanted advertisements on your screen
- 18. A form of malware used to spy on you and your computer activity
- 21. Concerning the proper handling of sensitive data to protect its confidentiality and meet regulatory requirements
