Cyber-Security Amanda Peart
Across
- 1. C of the CIA triad
- 2. computer operating system for Apple Computer's MacIntosh line of personal computers and workstations
- 3. the physical components that a computer system requires to function
- 6. a bit of data, which is sent by a sender, to a recipient
- 11. the software that supports a computer's basic functions
- 12. a person who uses computers to gain unauthorized access to data
- 13. I if the CIA Triad
- 14. to decode (a message) with or without previous knowledge of its key
- 17. encompasses measures taken to improve the security of an application
- 20. a file that exists of cells in rows and columns and can help arrange, calculate and sort data
- 21. a legal instrument governing the use or redistribution of software
- 26. heads the national effort to investigate and prosecute internet crimes, including "cyber-based terrorism, espionage, computer intrusions, and major cyber fraud"
- 27. the programs and other operating information used by a computer
- 29. A fo the CIA Triad
Down
- 1. allows the user to interact with the computer by typing in commands
- 4. caused 1 billion user accounts may have been comprised
- 5. nothing to do with a certain well-recognized US intelligence agency
- 7. the field of work in which someone manages one or more systems
- 8. convert (information or data) into a cipher or code, especially to prevent unauthorized access
- 9. each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet
- 10. the art of writing or solving codes
- 15. the study of codes, or the art of writing and solving them
- 16. a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword
- 18. A piece of software that prevents pop-up advertisements from being displayed
- 19. a hardware or software component that stores data
- 22. activity that either targets or uses a computer, a computer network or a networked device
- 23. a software program that runs on your computer
- 24. job is to protect online data from being compromised
- 25. developed by Microsoft Corporation to run personal computers
- 28. a way for software developers to fine-tune a product to make it the best it can be