Cyber Crossword

1234567891011121314151617181920212223242526
Across
  1. 1. A flaw or weakness in an information system that could be exploited
  2. 4. Phishing for the big prize!
  3. 5. A string of characters used to authenticate an identity
  4. 8. A mechanism for creating a secure connection between a computing device and a computer network
  5. 11. The ability of individuals to understand and exercise control over how information about themselves may be used by others
  6. 13. An unauthorized user who attempts to or gains access to an information system
  7. 14. Extra copies of computer files that can be used to restore files that are lost or damaged
  8. 16. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities
  9. 17. Converting data into a form that cannot be easily understood by unauthorized people
  10. 18. Software that compromises the operation of a system by performing an unauthorized function or process
  11. 19. Computer programs that can block, detect, and remove viruses and other malware
  12. 21. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital inform
  13. 22. Human characteristics used for identification
  14. 24. A type of malware that denies a user's access to a system or data until a sum of money is paid
  15. 26. Attempting to trick people into revealing sensitive information, often by using emails or fake websites that look like like they are from trusted
Down
  1. 2. A cybersecurity risk that originates from within an organization
  2. 3. Part of the internet that isn't indexed by search engines
  3. 6. A routine fix for a computer program
  4. 7. Software designed to block malware from entering protected networks
  5. 9. A replacement for passwords that provide more secure sign-ins to websites and apps across a user's devices
  6. 10. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user
  7. 12. A process or measure used to verify a user's identity
  8. 14. A collection of computers compromised by malicious code and controlled across a network
  9. 15. A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying da
  10. 20. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization
  11. 23. Unsolicited emails sent to many addresses
  12. 25. Faking the sending address of a transmission to gain illegal entry into a secure system