Cybersecurity Glosary

1234567891011121314151617
Across
  1. 3. Security principle ensuring that data is not altered or tampered with
  2. 4. Type of malware that locks data until a payment is made
  3. 6. Permission to access certain resources or perform actions
  4. 8. Fraudulent attempt to get sensitive information by pretending to be a trusted empty
  5. 9. Company that provides users access to the Internet
  6. 11. Malicious program disguised as legitimate software
  7. 12. Network of connected devices that communicate over the Internet
  8. 13. Unauthorized takeover of a system, network or online session
  9. 15. Process that converts data into unreadable code to protect it
  10. 17. Manipulating people to reveal confidential information
Down
  1. 1. Weak Points in a system that attackers can exploit
  2. 2. Security principle ensuring that systems and data are accesible when needed
  3. 5. Process of verifying someone's identity before granting access
  4. 7. Secret string of characters used for authentication
  5. 10. Probability that a threat will exploit a vulnerability
  6. 14. Software that secretly collects user data and send it to others
  7. 16. Risks that come from employees or people inside an organization