Cybersecurity Crossword Word Options: Redundancy, Malware, Confidentiality, Virus, Firewall, Integrity, Insider Threat, Availability, Authentication, Encryption

12345678910
Across
  1. 3. A person or group of persons within an organization who pose a potential risk through violating security policies
  2. 7. the property of information that has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
  3. 8. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
  4. 9. Software that compromises the operation of a system by performing an unauthorized function or process.
  5. 10. Network security device that monitors incoming and outgoing network traffic and permits or blocks data packets
Down
  1. 1. The process of verifying the identity or other attributes of an entity
  2. 2. The process of transforming plaintext into ciphertext
  3. 4. The property of being accessible and usable upon demand.
  4. 5. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
  5. 6. Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process