Cyber Security

12345678
Across
  1. 1. Verifying the identity of a user, process or device before allowing access to resources in a system.
  2. 2. The conversion of electronic plaintext data into unreadable ciphertext using algorithms. It protects the confidentially of data.
  3. 3. Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.
  4. 6. engineering The methods used to manipulate people into carrying out specific actions, or divulging information.
  5. 7. A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. It can be used to track a user’s activity while browsing the internet.
  6. 8. A fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
Down
  1. 1. A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
  2. 4. Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
  3. 5. A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).