Cybersecurity Term Bank

1234567891011121314151617181920212223242526
Across
  1. 3. Breach Unauthorized release or theft of information
  2. 5. Verifying a user’s identity
  3. 6. Access Terminal Device (screen/keyboard) for interacting with a computer
  4. 8. Malware that self-replicates and spreads across networks
  5. 10. Trick users into giving information via fake messages
  6. 13. Privilege Giving users the minimum access needed
  7. 17. Instructions that run on hardware to perform tasks
  8. 18. Device that forwards data between networks
  9. 19. attacks Flooding a target with traffic to overwhelm it
  10. 20. Number used by a protocol for communication
  11. 21. Event with potential to harm systems or data
  12. 23. Computer providing resources to others
  13. 25. Reliable access to data and systems
  14. 26. in Depth Multiple layers of security protection
Down
  1. 1. Converting plaintext into unreadable code
  2. 2. Software designed to harm systems or data
  3. 4. Weakness that can be exploited
  4. 7. Keeping info accessible only to authorized users
  5. 9. Reducing features or data exposure
  6. 11. Ensuring data is accurate and unchanged
  7. 12. Control Process of granting or denying use of resources
  8. 14. Information at rest, in use, or in transit
  9. 15. Malware that spreads by attaching to files/programs
  10. 16. in the Middle (MITM) Attacker intercepts and alters communication
  11. 22. Physical parts of a computer
  12. 24. System that filters network traffic