Computer Threats
Across
- 4. Core topic Weakness that threats can exploit
- 5. Core topic Possible danger that may damage data
- 9. Main focus of your lesson Protecting data and systems from harm
- 10. From CIA Triad (Lesson 3 link) Ensuring information is kept private
Down
- 1. From CIA Triad (Lesson 3 link) Keeping data accurate and unchanged
- 2. Example of a computer threat Harmful software that damages systems
- 3. Security defense Blocks unauthorized network access
- 4. Example of user protection Secret code that secures access
- 5. From CIA Triad (Lesson 3 link) Ensuring data is always accessible
- 6. Example of an attack Fake message designed to steal data
- 7. Common threat actor A person who breaks into systems
- 8. Target of most threats Information stored or processed in computers