Information Security

12345678910111213141516
Across
  1. 2. A private combination of characters associated with the user name that allows access to certain computer resources.
  2. 6. A copy of a file, program, or media that can be used if the original is lost, damaged, or destroyed.
  3. 9. The process of storing, analyzing, retrieving, and preserving electronic data that may be useful in an investigation.
  4. 11. A security system, which can be either hardware or software-based. It monitors and controls incoming and outgoing network.
  5. 13. A method used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
  6. 14. Ensures your internet privacy and anonymity while surfing, shopping, and banking online by hiding your location.
  7. 15. An electronic, encrypted, stamp of authentication on digital information such as email messages or electronic documents.
  8. 16. A person who breaks into a computer system to installing malware, stealing or destroying data.
Down
  1. 1. A device that can identify a person using their unique facial characteristics, fingerprints, signatures, DNA.
  2. 3. An online or Internet-based illegal acts.
  3. 4. A malicious software that disrupt systems, cause major operational issues, and result in data loss and leakage.
  4. 5. A monitoring system that detects suspicious activities and generates alerts when they are detected.
  5. 6. A group of compromised computers or mobile devices connected to a network.
  6. 7. A scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
  7. 8. A program that protects website from botnet by telling human and computer apart automatically.
  8. 10. When someone steals another person's information such as passport number, bank account with the intent to commit fraud.
  9. 12. A malware that is capable of spreading by itself with no human interaction and infect other computers while remaining active on infected systems..