Cyber Security
Across
- 3. a technology that creates a secure, encrypted connection over an insecure network like the Internet.
- 4. practice of sending spam emails by impersonating legitimate sources.
- 5. a situation in which an attacker can physically look at a device’s screen or keyboard and enter passwords to obtain personal information
- 8. an error in the design or implementation of a system that can be exploited to cause unexpected or undesirable behaviour
- 9. the process of transforming an ordinary message (plaintext) into a meaningless message (ciphertext)
- 10. Only authorized users and processes should be able to access or modify data
Down
- 1. Authorized users should be able to access data whenever they need to do so
- 2. a hardware or software-based network security device that monitors all incoming and outgoing traffic
- 6. a type of attack on computing devices in which an attacker attempts to steal the identity of a legitimate user and pretend to be someone else
- 7. malware to extort money from users for ransom by gaining unauthorized access to sensitive user information and demanding payment to delete or return that information from the user.