Cybersecurity Awareness

123456789101112131415
Across
  1. 4. measures that reduce the likelihood of an unwanted occurrence or lessen its consequences
  2. 6. software that compromises the operation of a system by performing an unauthorized function or process
  3. 8. a computer program that can replicate itself, infect a computer without permission or knowledge of the user, and spread further
  4. 9. an attack method that uses trial and error to crack passwords
  5. 11. abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages
  6. 13. a type of malware that conceals its true content to fool a user into thinking it's a harmless file
  7. 15. the fraudulent practice of sending test messages purporting to be form reputable companies in order to convince individuals to reveal personal information
Down
  1. 1. the ability to adapt to changing conditions and prepare for, withstand, and rapidly recover from disruption
  2. 2. a digital form of social engineering to deceive individuals into providing sensitive information or exposing their system to malware
  3. 3. limits network traffic between networks or systems
  4. 5. an unauthorized user who attempts to or gains access to an information system
  5. 7. the process of verifying one's identity
  6. 10. a technology that allows a program to interact with the internals of another program running on a different machine
  7. 12. An attempt to gain unauthorized access to system services, resources, or information
  8. 14. a string of characters used to authenticate an identity or to verify authorizes access