Cybersecurity terms
Across
- 4. Barrier between a trusted network and an untrustworthy network.
- 7. A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
- 10. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
- 12. It refers to protecting information from unauthorized user
- 13. A form of malware used by hackers to spy on you and your computer activities.
Down
- 1. Visit the global policy database and find the title of MFC-STA-023
- 2. Also referred to as two-factor authentication
- 3. Short for malicious software
- 5. The process of converting information into a code to prevent unauthorized access.
- 6. It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
- 8. It is the process of converting coded or encrypted data to its original form.
- 9. It means data are accessible when you need them
- 10. It relates to rights to control the sharing and use of one’s personal information
- 11. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.