Cybersecurity Principles Crossword Challenge
Across
- 5. cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- 6. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
- 7. a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
Down
- 1. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- 2. cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- 3. type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- 4. Malware that encrypts or locks a victim's computer files until the victim meets their demands