Basic cybersecurity terms
Across
- 2. An event that could lead to loss of, or disruption to, an organization's operations, services, or functions.
- 4. The process of converting information or data into a code, especially to prevent unauthorized access.
- 8. A security process that verifies the identity of a user or device attempting to access a system.
- 9. A copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event.
- 10. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Down
- 1. A cybercrime in which targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data.
- 3. An incident where data, trade secrets, or intellectual property is viewed, stolen, or used by an unauthorized individual.
- 5. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 6. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- 7. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.