CYBER SECURITY

1234567891011121314151617181920212223
Across
  1. 3. A collection of computers connected together.
  2. 5. A copy of data made in case the original is lost.
  3. 6. Protects data by scrambling it so others can't read it.
  4. 9. Personal information that should be protected.
  5. 14. A trick used to steal information by pretending to be trustworthy.
  6. 15. A weakness, flaw, or error in a system's design, implementation, internal controls, or security procedures
  7. 16. Unwanted or junk email messages.
  8. 17. When legitimate users are denied access to computer services by overloading the service with requests.
  9. 18. The tangible, physical components of computing and networking systems that require protection
  10. 21. A digital wall that blocks unauthorized access.
  11. 22. Malicious software that makes data or systems unusable until the victim makes a payment.
  12. 23. Software that is designed to detect, stop and remove viruses and other kinds of malicious software.
Down
  1. 1. Any potential, often malicious, event or action that seeks to exploit vulnerabilities.
  2. 2. Recently discovered vulnerabilities, not yet known to vendors or antivirus companies, that hackers can exploit
  3. 4. Ensures that data, systems, and resources are accessible to authorized users when needed.
  4. 6. A program or system designed to take advantage of a particular error or security vulnerability in computers or networks.
  5. 7. Updates applied to firmware or software to improve security.
  6. 8. Manipulating people into carrying out specific aactions, or divulging information, that's of use to an attacker.
  7. 10. Ensures that sensitive information is accessed only by authorized users.
  8. 11. Ensures that sensitive information is accessed only by authorized users.
  9. 12. Harmful software designed to damage systems.
  10. 13. A person who breaks into systems legally or illegally.
  11. 14. A secrete word or phrase used to log into an account.
  12. 19. Where shared compute and storage resources are accessed as a service, instead of hosted locally.
  13. 20. A type of malware or virus disguised as legitimate software, that is used to hack into the victims computer.