Cyber Security Month Crossword

123456789101112131415
Across
  1. 1. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  2. 5. A digital form of social engineering to deceive individuals into providing sensitive information.
  3. 9. A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.
  4. 11. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  5. 13. Facebook, Twitter, Instagram, etc. (Two words)
  6. 14. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
  7. 15. Software that compromises the operation of a system by performing an unauthorized function or process.
Down
  1. 2. Widely used in-home network technololy that allows for wireless connection.
  2. 3. A security tool that creates a secure, encrypted connection between you and the internet
  3. 4. A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
  4. 6. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  5. 7. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  6. 8. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  7. 10. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  8. 12. An unauthorized user who attempts to or gains access to an information system.