Cybersecurity Principles Crossword Challenge

1234567
Across
  1. 5. cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
  2. 6. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application
  3. 7. a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
Down
  1. 1. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
  2. 2. cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
  3. 3. type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
  4. 4. Malware that encrypts or locks a victim's computer files until the victim meets their demands