Cybersecurity Santiago Yeison Cristian Yefferson
Across
- 3. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- 4. Criminal activities carried out using computers or the internet.
- 5. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- 9. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 13. The programs and other operating information used by a computer.
- 15. The quality of being trustworthy or of performing consistently well.
- 16. The use of computers and the internet to conduct warfare in cyberspace.
- 19. Software used to prevent, detect, and remove malicious software.
- 20. The process of encoding information in such a way that only authorized parties can access it.
Down
- 1. Criminal activities carried out using computers or the internet.
- 2. The practice of protecting systems, networks, and programs from digital attacks.
- 5. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- 6. Characterized by malice; intending or intended to do harm.
- 7. As discussed, malicious software.
- 8. An attempt by hackers to damage or destroy a computer network or system.
- 10. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- 11. The process of converting encrypted data back into its original form.
- 12. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- 14. Permanent software programmed into a read-only memory.
- 16. The practice of protecting systems, networks, and programs from digital attacks.
- 17. Broader than antivirus, it protects against various forms of malware, not just viruses.
- 18. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.