Computer Threats

12345678910
Across
  1. 4. Core topic Weakness that threats can exploit
  2. 5. Core topic Possible danger that may damage data
  3. 9. Main focus of your lesson Protecting data and systems from harm
  4. 10. From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
  1. 1. From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
  2. 2. Example of a computer threat Harmful software that damages systems
  3. 3. Security defense Blocks unauthorized network access
  4. 4. Example of user protection Secret code that secures access
  5. 5. From CIA Triad (Lesson 3 link) Ensuring data is always accessible
  6. 6. Example of an attack Fake message designed to steal data
  7. 7. Common threat actor A person who breaks into systems
  8. 8. Target of most threats Information stored or processed in computers