Cybersecurity Unit

123456789101112131415161718192021
Across
  1. 3. illegally copying and/or distributing software.
  2. 4. malware designed to trick users by posing as legitimate software.
  3. 6. an ethical hacker.
  4. 9. spam via telephone.
  5. 13. the ability to verify the identity of an entity or individual.
  6. 17. someone that is new to hacking.
  7. 18. protection of information from being shared to unauthorized systems, entities, or individuals.
  8. 20. the ability to correlate, with high certainty, a recorded action with its originating individual or entity.
Down
  1. 1. an authentication process that allows a user to access multiple applications with one set of login credentials.
  2. 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
  3. 5. type of hacker that is malicious and often participates in criminal acts.
  4. 7. timely, reliable access to data and information services by authorized users.
  5. 8. malware which is capable of making multiple copies of itself on a single device.
  6. 10. specializes in defense, such as building firewalls.
  7. 11. unsolicited emails that are generally sent in mass.
  8. 12. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  9. 14. Protection of information, systems, and services from unauthorized modification/destruction.
  10. 15. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information.
  11. 16. between a black and white hat. They often work for the government.
  12. 19. malware that can copy itself from one computer to another.
  13. 21. vigilante hacker.