Cybersecurity Crossword Word Options: Redundancy, Malware, Confidentiality, Virus, Firewall, Integrity, Insider Threat, Availability, Authentication, Encryption
Across
- 3. A person or group of persons within an organization who pose a potential risk through violating security policies
- 7. the property of information that has remained unaltered from the point it was produced by a source, during transmission, storage, and eventual receipt by the destination.
- 8. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- 9. Software that compromises the operation of a system by performing an unauthorized function or process.
- 10. Network security device that monitors incoming and outgoing network traffic and permits or blocks data packets
Down
- 1. The process of verifying the identity or other attributes of an entity
- 2. The process of transforming plaintext into ciphertext
- 4. The property of being accessible and usable upon demand.
- 5. Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
- 6. Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process