Cybersecurity Vocab
Across
- 3. program designed to breach the security of a computer system.
- 9. verifying identity.
- 10. info is stolen without knowledge or authorization.
- 11. attempt by hackers to damage or destroy a computer network or system.
- 12. self replicating and infects other computers while remaining active on other infected systems.
Down
- 1. preventing and mitigating attacks on computer systems.
- 2. software that enables a user to obtain covert information from one's computer activities.
- 4. software that blocks access to a computer until a sum of money is paid.
- 5. fake e-mails to gain access to credit cards or personal information.
- 6. area of control or sphere of knowledge.
- 7. the process of converting info or date into a code.
- 8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer.