Information Security
Across
- 2. A private combination of characters associated with the user name that allows access to certain computer resources.
- 6. A copy of a file, program, or media that can be used if the original is lost, damaged, or destroyed.
- 9. The process of storing, analyzing, retrieving, and preserving electronic data that may be useful in an investigation.
- 11. A security system, which can be either hardware or software-based. It monitors and controls incoming and outgoing network.
- 13. A method used to protect data from being stolen, changed, or compromised and works by scrambling data into a secret code that can only be unlocked with a unique digital key.
- 14. Ensures your internet privacy and anonymity while surfing, shopping, and banking online by hiding your location.
- 15. An electronic, encrypted, stamp of authentication on digital information such as email messages or electronic documents.
- 16. A person who breaks into a computer system to installing malware, stealing or destroying data.
Down
- 1. A device that can identify a person using their unique facial characteristics, fingerprints, signatures, DNA.
- 3. An online or Internet-based illegal acts.
- 4. A malicious software that disrupt systems, cause major operational issues, and result in data loss and leakage.
- 5. A monitoring system that detects suspicious activities and generates alerts when they are detected.
- 6. A group of compromised computers or mobile devices connected to a network.
- 7. A scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.
- 8. A program that protects website from botnet by telling human and computer apart automatically.
- 10. When someone steals another person's information such as passport number, bank account with the intent to commit fraud.
- 12. A malware that is capable of spreading by itself with no human interaction and infect other computers while remaining active on infected systems..