Cyber Crossword
Across
- 1. A flaw or weakness in an information system that could be exploited
- 4. Phishing for the big prize!
- 5. A string of characters used to authenticate an identity
- 8. A mechanism for creating a secure connection between a computing device and a computer network
- 11. The ability of individuals to understand and exercise control over how information about themselves may be used by others
- 13. An unauthorized user who attempts to or gains access to an information system
- 14. Extra copies of computer files that can be used to restore files that are lost or damaged
- 16. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
- 17. Converting data into a form that cannot be easily understood by unauthorized people
- 18. Software that compromises the operation of a system by performing an unauthorized function or process
- 19. Computer programs that can block, detect, and remove viruses and other malware
- 21. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital inform
- 22. Human characteristics used for identification
- 24. A type of malware that denies a user's access to a system or data until a sum of money is paid
- 26. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like like they are from trusted
Down
- 2. A cybersecurity risk that originates from within an organization
- 3. Part of the internet that isn't indexed by search engines
- 6. A routine fix for a computer program
- 7. Software designed to block malware from entering protected networks
- 9. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices
- 10. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user
- 12. A process or measure used to verify a user's identity
- 14. A collection of computers compromised by malicious code and controlled across a network
- 15. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying da
- 20. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
- 23. Unsolicited emails sent to many addresses
- 25. Faking the sending address of a transmission to gain illegal entry into a secure system