Cybersecurity Midterm Review Crossword

1234567891011121314151617
Across
  1. 2. This type of phishing is directed only towards one person
  2. 4. This encryption type uses two keys: public and private
  3. 7. a type of malware that automatically displays unwanted advertisements
  4. 9. intentionally spreading false facts
  5. 10. accidentially spreading false facts
  6. 12. a piece of code that remains idle until certain conditions are met
  7. 13. this type of encryption uses the same key for encrypting and decrypting data
  8. 14. this type of malware spreads by attaching itself to files and programs
  9. 15. the practice and study of writing codes
  10. 16. abbreviation for allowing people to bring their own devices to work
  11. 17. permanently deleting data so that it can't be recovered by standard methods
Down
  1. 1. A trusted third party that holds a copy of your private key in case you lose it
  2. 3. a type of trojan that allows a cybercriminal to remotely control a computer
  3. 5. stands for malicious software
  4. 6. This part of the CIA Triad ensures that information remains secret
  5. 7. this part of the CIA triad ensures that systems are always available for use
  6. 8. a type of malware that records keystrokes
  7. 11. attempting to gain sensitive information through electronic communication