Cybersecurity Terms

1234567891011121314151617181920
Across
  1. 2. The act of being in accordance with established guidelines.
  2. 4. When someone is using another person's information maliciously.
  3. 7. A security method that encodes data to make it more secure.
  4. 10. A valuable tool for developing applications.
  5. 13. A group of connected computers that share user account information and a security policy.
  6. 15. This must be protected from unauthorized access.
  7. 17. A special computer designed for technical or scientific applications.
  8. 18. Establishing something as genuine.
  9. 19. In technology, this means maintaining hardware and software.
  10. 20. Relating to software,a company that develops and sells products.
Down
  1. 1. Programs on hardware.
  2. 3. When you open a malicious email or text that is disguised as a legitimate one.
  3. 5. A service that provides technology-related help.
  4. 6. A type of secure connection.
  5. 8. A type of coverage that insures in case of a cyber attack.
  6. 9. When data is stolen from a system without the system's owner noticing.
  7. 11. A string of letters, numbers, and/or symbols used for verifying identity.
  8. 12. A person who commits fraud and/or is involved in fraudulent schemes.
  9. 14. Malicious software that holds data hostage until a ransom is paid.
  10. 16. Disguising an unknown source as a known source.