Cybersecurity Unit
Across
- 3. illegally copying and/or distributing software.
- 4. malware designed to trick users by posing as legitimate software.
- 6. an ethical hacker.
- 9. spam via telephone.
- 13. the ability to verify the identity of an entity or individual.
- 17. someone that is new to hacking.
- 18. protection of information from being shared to unauthorized systems, entities, or individuals.
- 20. the ability to correlate, with high certainty, a recorded action with its originating individual or entity.
Down
- 1. an authentication process that allows a user to access multiple applications with one set of login credentials.
- 2. the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
- 5. type of hacker that is malicious and often participates in criminal acts.
- 7. timely, reliable access to data and information services by authorized users.
- 8. malware which is capable of making multiple copies of itself on a single device.
- 10. specializes in defense, such as building firewalls.
- 11. unsolicited emails that are generally sent in mass.
- 12. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 14. Protection of information, systems, and services from unauthorized modification/destruction.
- 15. the fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information.
- 16. between a black and white hat. They often work for the government.
- 19. malware that can copy itself from one computer to another.
- 21. vigilante hacker.