Cybersecurity

123456789101112131415161718192021222324
Across
  1. 5. The process of encoding information in such a way that only authorized parties can access it.
  2. 6. A person who uses computers to gain unauthorized access to data.
  3. 7. Characterized by malice; intending or intended to do harm.
  4. 8. As discussed, malicious software.
  5. 10. The gaining of unauthorized access to data in a system or computer.
  6. 12. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  7. 16. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
  8. 18. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
  9. 22. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
  10. 23. The use of computers and the internet to conduct warfare in cyberspace.
  11. 24. Software used to prevent, detect, and remove malicious software.
Down
  1. 1. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  2. 2. The practice of protecting systems, networks, and programs from digital attacks.
  3. 3. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
  4. 4. Broader than antivirus, it protects against various forms of malware, not just viruses.
  5. 9. A hacker who uses their skills for defensive purposes, often hired to test system vulnerabilities.
  6. 11. Criminal activities carried out using computers or the internet.
  7. 13. The quality of being trustworthy or of performing consistently well.
  8. 14. An attempt by hackers to damage or destroy a computer network or system.
  9. 15. The process of converting encrypted data back into its original form.
  10. 17. Permanent software programmed into a read-only memory.
  11. 19. The programs and other operating information used by a computer.
  12. 20. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
  13. 21. The action or process of identifying the presence of something.