Information Security

12345678910111213141516171819
Across
  1. 3. Digital proof of identity used in secure communications (9 letters)
  2. 6. A program that pretends to be legitimate but is malicious (5 letters)
  3. 7. An attack that overwhelms a system with traffic (3 letters)
  4. 10. Opposite of encryption (11 letters)
  5. 11. The process of converting data into unreadable form (10 letters)
  6. 12. Software that spreads copies of itself across networks (5 letters)
  7. 16. Ensuring data is not altered during storage or transfer (7 letters)
  8. 17. Harmful software designed to damage systems (6 letters)
  9. 18. Short form of "Personally Identifiable Information" (3 letters)
  10. 19. Unauthorized access to a computer system (5 letters)
Down
  1. 1. The process of verifying user identity (14 letters)
  2. 2. Practice of disguising data to protect privacy (7 letters)
  3. 4. Malicious software that locks files and demands payment (10 letters)
  4. 5. Secret word or phrase used for authentication (8 letters)
  5. 8. Unintended weakness in software that can be exploited (12 letters)
  6. 9. A person who breaks into systems legally to find vulnerabilities (9 letters)
  7. 10. Stronger form of DoS using multiple computers (4 letters)
  8. 13. Attempt to trick users into revealing sensitive information via fake emails (7 letters)
  9. 14. Security barrier between internal network and outside world (8 letters)
  10. 15. Secret numeric code used in two-factor authentication (3 letters)