Cyber Security
Across
- 3. A memorized secret consisting of a sequence of words or other text that a claimant uses to authenticate their identity.
- 4. The loss of confidentiality, integrity, or availability of information, data, or information (or control) systems
- 6. A way of translating data from plaintext (unencrypted) to ciphertext (encrypted).
- 8. The fraudulent practice of sending emails or other messages purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
- 9. A patch, upgrade, or other modification to code that corrects security and/or functionality problems in software.
- 11. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- 13. A security feature offered by many websites, applications and devices that dramatically improves account security.
- 15. Ensuring timely and reliable access to and use of information.
Down
- 1. The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- 2. An ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable.
- 5. Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.
- 7. Assurance that the confidentiality of, and access to, certain information about an entity is protected.
- 10. Types of software products which attempt to detect, quarantine and/or block malware from running on devices.
- 12. Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
- 14. A weakness in an IT system that can be exploited by an attacker to deliver a successful attack.