Cyber Security Threads
Across
- 2. An attack that floods a network with excessive traffic, disrupting services
- 6. Ensures that data is accurate and has not been tampered with
- 9. Falsifying data to deceive systems or users
- 10. The ability of a system to recover quickly from disruptions or attacks
- 12. Ensures that systems are accessible and functional when needed
Down
- 1. Ensures that information is accessible only to those authorized to access it
- 3. The process of converting information into a secret code
- 4. A model that describes the stages of a cyberattack ( 2 words )
- 5. A weakness in a system that can be exploited by attackers
- 7. A type of malware disguised as legitimate software
- 8. A potential danger or harmful event in cybersecurity
- 11. A security system that monitors and controls network traffic
- 13. An attempt to exploit a system or network