Chapter 1 - Introduction to Cybersecurity

12345678910111213141516171819
Across
  1. 2. The combination of the probability of an attack and the potential damage it could cause. (4 letters)
  2. 3. The practice of protecting digital systems, networks, and programs. (13 letters)
  3. 4. The practice of protecting information to ensure its confidentiality, integrity, and availability. (12 letters)
  4. 8. The process of linking an action to a specific user. (10 letters)
  5. 9. A person who explores and manipulates computer systems. (7 letters)
  6. 13. The granting of privileges to a user after their identity is confirmed. (13 letters)
  7. 15. A threat originating from outside a company's network. (8 letters)
  8. 17. The process of safeguarding an organization's sensitive information. (10 letters)
  9. 18. An ethical hacker who uncovers and fixes system vulnerabilities. (10 letters)
  10. 19. The of stealing electronic data. (5 letters)
Down
  1. 1. Amateur hackers who use tools created by others. (12 letters)
  2. 5. A hacker who engages in malicious activities for personal gain or harm.
  3. 6. A weakness or flaw that can be exploited by an attack. (13 letters)
  4. 7. A potential event that could exploit a vulnerability and cause harm. (6 letters)
  5. 8. The process of confirming a user's identity. (14 letters)
  6. 10. The state of being usable and accessible to authorized users when required. (13 letters)
  7. 11. An attack that is well-planned and carried out by skilled attackers. (10 letters)
  8. 12. The property of data being accurate, consistent, and unaltered. (9 letters)
  9. 14. A action on a system or network with the intent to cause damage or steal information. (6 letters)
  10. 16. A hacker who may one day become either a black-hat or white-hat hacker. (8 letters)