Cybersecurity Midterm Review Crossword
Across
- 2. This type of phishing is directed only towards one person
- 4. This encryption type uses two keys: public and private
- 7. a type of malware that automatically displays unwanted advertisements
- 9. intentionally spreading false facts
- 10. accidentially spreading false facts
- 12. a piece of code that remains idle until certain conditions are met
- 13. this type of encryption uses the same key for encrypting and decrypting data
- 14. this type of malware spreads by attaching itself to files and programs
- 15. the practice and study of writing codes
- 16. abbreviation for allowing people to bring their own devices to work
- 17. permanently deleting data so that it can't be recovered by standard methods
Down
- 1. A trusted third party that holds a copy of your private key in case you lose it
- 3. a type of trojan that allows a cybercriminal to remotely control a computer
- 5. stands for malicious software
- 6. This part of the CIA Triad ensures that information remains secret
- 7. this part of the CIA triad ensures that systems are always available for use
- 8. a type of malware that records keystrokes
- 11. attempting to gain sensitive information through electronic communication