Cybersecurity Terminology

12345678910
Across
  1. 2. The process of encoding information in such a way that only authorized parties can access it
  2. 7. The practice of protecting systems, networks, and programs from digital attacks
  3. 8. A person who uses computers to gain unauthorized access to data.
  4. 9. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
  5. 10. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network
Down
  1. 1. A type of malicious software designed to block access to a computer system until a sum of money is paid
  2. 3. Software used to prevent, detect, and remove malicious software
  3. 4. The process of decoding
  4. 5. An attempt by hackers to damage or destroy a computer network or system
  5. 6. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
  6. 8. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.