Cybersecurity Concepts

12345678910
Across
  1. 1. a term commonly used to describe a person who tries to gain unauthorized access to a network or computer system
  2. 6. the name commonly given to unwanted emails
  3. 8. Made up of devices that are all connected to each other, like computers and
  4. 9. a security system that forms a virtual perimeter around a network of workstations preventing an attack
  5. 10. the process of verifying the identity of a user or piece of information
Down
  1. 2. a process of maintaining data confidentiality by converting plain data into secret code
  2. 3. makes sure that there are no unauthorized changes to information of systems
  3. 4. A Virtual Private Network
  4. 5. a collection of compromised computers running malicious programs that are controlled remotely by a cyber-criminal
  5. 7. a program that gives a hacker remote access to, and control over, a computer or network