Chapter 5 - Crime and Security

12345678910111213141516171819
Across
  1. 2. requiring users to do multiple authentications checks
  2. 4. ensuring systems are available
  3. 8. the use of computers or networks to perform unethical activity
  4. 10. ensuring private data remains private
  5. 11. the process of transforming data into secret code to prevent theft
  6. 12. process where security professionals report vulnerabilities within the system
  7. 15. psychological feelings and characteristics for an individual
  8. 16. the state of being protected or safe
  9. 18. not likely to cause harm
  10. 19. ensuring data is not changed without correct authentication
Down
  1. 1. the process of proving something is true
  2. 3. automated measurements to discover physical or behavioral characteristics
  3. 5. a method to bypass regular authentication. Usually used by law enforcement
  4. 6. the use of hacking to hurt or benefit a political cause
  5. 7. the state of being exposed and the potential of being harmed
  6. 9. the process of simulating cyberattacks on a system
  7. 13. people who can help protect the digital world
  8. 14. individuals that will be using the system created
  9. 17. an act that is considered shameful or wrong
  10. 18. irresponsible or destructive action performed by a criminal