Chapter 1 - Introduction to Cybersecurity
Across
- 2. The combination of the probability of an attack and the potential damage it could cause. (4 letters)
- 3. The practice of protecting digital systems, networks, and programs. (13 letters)
- 4. The practice of protecting information to ensure its confidentiality, integrity, and availability. (12 letters)
- 8. The process of linking an action to a specific user. (10 letters)
- 9. A person who explores and manipulates computer systems. (7 letters)
- 13. The granting of privileges to a user after their identity is confirmed. (13 letters)
- 15. A threat originating from outside a company's network. (8 letters)
- 17. The process of safeguarding an organization's sensitive information. (10 letters)
- 18. An ethical hacker who uncovers and fixes system vulnerabilities. (10 letters)
- 19. The of stealing electronic data. (5 letters)
Down
- 1. Amateur hackers who use tools created by others. (12 letters)
- 5. A hacker who engages in malicious activities for personal gain or harm.
- 6. A weakness or flaw that can be exploited by an attack. (13 letters)
- 7. A potential event that could exploit a vulnerability and cause harm. (6 letters)
- 8. The process of confirming a user's identity. (14 letters)
- 10. The state of being usable and accessible to authorized users when required. (13 letters)
- 11. An attack that is well-planned and carried out by skilled attackers. (10 letters)
- 12. The property of data being accurate, consistent, and unaltered. (9 letters)
- 14. A action on a system or network with the intent to cause damage or steal information. (6 letters)
- 16. A hacker who may one day become either a black-hat or white-hat hacker. (8 letters)