Cybersecurity Risk

12345678910111213
Across
  1. 3. Malware aimed to corrupt or modify data on one computer before spreading to others.
  2. 4. a sequence of letters, characters, and numbers used for authentication
  3. 7. a technique used in order to manipulate and deceive people into handing over sensitive information.
  4. 8. A network device that determines what information is able to enter a system based on the rules in place.
  5. 9. a technique to obtain sensitive information typically through text messaging
  6. 10. the process of encoding data so that it can only be accessed by its intended recipient.
  7. 12. the state of being exposed to the possibility of being attacked
  8. 13. the act of appearing to be someone or thing that you are not
Down
  1. 1. measures taken in order to protect systems and their data.
  2. 2. A network that uses encryption in order to in order to maintain privacy.
  3. 4. a technique to obtain sensitive information typically through email.
  4. 5. Software that locks your device and hold the data hostage and demands a price.
  5. 6. intrusive software developed to wreak havoc on systems; also known as malicious software
  6. 11. a sequence of words used for authentication.
  7. 12. is the act of confirmation through evidence of somethings validity.