My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyber Security Words and Terms

Horizontales
The process of verifying the identity or other attributes of an entity (user, process, or device).
What type of authentication uses two independent mechanisms to verify the identity of a user, such as a password and smart/PKI card.
From Nick Espinosa's 1st law of Cyber Security, if there is a vulnerability it will be ____
A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
According to Nick Espinosa's 4th law of Cyber Security; With _____ comes opportunity for exploitation.
Shoulder ____is a type of data theft where cybercriminals steal personal information or confidential information by peering over the target's shoulders
Identity _____ refers to the process of stealing someone’s personal identification data and using it online in order to pose as that person.
A framework consisting of standards and services to enable secure, encrypted communication and authentication over potentially insecure networks such as the Internet.
The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.
Information _____ is a set of measures designed to protect and defend data and information systems by ensuring that they are always available, that their integrity is safe, that they’re confidential and authentic (non-repudiation principle).
Three letter acronym of a service that creates an encrypted tunnel between you and a remote server.
A _____ force attack is a technique used by hackers in which a high number of keywords or password combinations are tested in order to gain access to a site or a network.
Software or hardware that tracks keystrokes and keyboard events, usually surreptitiously / secretly, to monitor actions by the user of an information system.
An unauthorized user who attempts to or gains access to an information system.
The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
Verticales
Software that compromises the operation of a system by performing an unauthorized function or process. Synonym(s): malicious code, malicious applet, malicious logic
_____refers to a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
_____ computing is a model for enabling on-demand network access to a shared pool of configurable computing capabilities or resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system
A circumstance or event that has or indicates the potential to exploit vulnerabilities and to adversely impact (create adverse consequences for) organizational operations, organizational assets (including information and information systems), individuals, other organizations, or society.
a short-range radio technology (or wireless technology) aimed at simplifying communications among internet devices and between devices and the internet.
____software used to prevent, scan, detect and delete viruses from a computer.
The process of transforming plaintext into ciphertext
a type of malicious software cyber criminals use to block you from accessing your own data. The digital extortionists encrypt the files on your system and add extensions to the attacked data and hold it “hostage” until the demanded ransom is paid.
A capability to limit network traffic between networks and/or information systems
A _____ is a small piece of text sent to your browser by a website you visit. It helps the website to remember information about your visit, like your preferred language and other settings.
A state in which information has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
A digital form of social engineering to deceive individuals into providing sensitive information.
Nick Espinosa's 3rd law of Cyber Security states: "Humans _____ even when they shouldn't".
is a commonly used method of website protection against spamming bot activity. It is a free human verification system that protects the website from various types of abuse.
_____security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.