Cybersecurity Recap

123456789101112131415
Across
  1. 5. Harmful software designed to damage, disrupt, or gain unauthorized access to a computer system
  2. 8. The process of determining what an authenticated user is allowed to access or do
  3. 9. A security system that monitors and controls incoming and outgoing network traffic
  4. 12. The process of proving who you are, such as logging in with a password or fingerprint
  5. 14. A type of malware that spreads by attaching itself to files and can damage or delete data
  6. 15. Authentication a security method that requires two forms of verification to access an account
Down
  1. 1. The process of converting data into a coded format so only authorized users can read it
  2. 2. Ensuring systems and data are accessible when needed
  3. 3. Malware that disguises itself as legitimate software to trick users into installing it
  4. 4. Engineering manipulating people into giving up confidential information rather than hacking systems
  5. 6. Triad a cybersecurity model that includes confidentiality, integrity, and availability
  6. 7. A cyber attack where scammers send fake emails or messages to trick people into giving personal information
  7. 10. Making sure data is accurate and has not been altered without permission
  8. 11. Ensuring that information is only accessible to authorized users
  9. 13. A secret word or phrase used to access an account or system