OA ISM SECURITY CROSSWORD
Across
- 3. A person who attempts to gain unauthorized access to computer systems.
- 4. The quality of data being accurate, consistent, and unaltered.
- 5. The process of converting data into a code to prevent unauthorized access.
- 8. A piece of code capable of self-replicating and causing damage to a computer system.
- 11. Faking the source of data to appear as if it's coming from a trusted source.
- 12. The state of keeping information private and only accessible to authorized parties.
- 13. A network security device that monitors and controls incoming and outgoing traffic.
- 16. Ensuring that computer systems and data are accessible when needed.
Down
- 1. Software intended to harm or exploit computer systems and data.
- 2. Measures taken to secure computer systems from threats and vulnerabilities.
- 6. A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
- 7. (Virtual Private Network): A technology that provides secure and private connections over public networks.
- 9. Malicious software that encrypts a user's data and demands payment to restore access.
- 10. Software that collects information from a computer or network without the user's knowledge.
- 11. Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
- 14. A secret combination of characters used to access a system or data.
- 15. The potential for loss or harm in the context of cybersecurity.