Cyber Security ACMH
Across
- 5. Malware that is loaded onto a computer and then run without the user's knowledge or knowledge of it's full effects.
- 6. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
- 11. Something that can cause harm to a system or organization.
- 13. The transformation of data to hide its information content.
- 14. Malware that passes information about a computer user's activities to an external party.
- 16. Intrusion detection system that also blocks unauthorized access when detected.
- 17. The process to verify that someone is who they claim to be when they try to access a computer or online service.
Down
- 1. Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.
- 2. Obtaining evidence of identity by two independent means.
- 3. Software intended to infiltrate and damage or disable computers.
- 4. The process of identifying, analyzing and evaluating risk.
- 7. A flaw or weakness that can be used to attack a system or organization.
- 8. Method used by criminals to try to obtain financial or other confidential information from internet users, usually through email.
- 9. A secret series of characters used to authenticate a person's identity.
- 10. Malware that replicates itself so it can spread to infiltrate other computers.
- 12. Someone who violates computer security for malicious reasons, kudos or personal gain.
- 15. Something that could cause an organization no to meet one of its objectives