information security

12345678910111213141516171819202122232425262728
Across
  1. 4. An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
  2. 5. A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
  3. 6. An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
  4. 11. A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
  5. 13. All malicious software, including viruses, Trojan horses, and worms
  6. 15. Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
  7. 16. A weakness in some aspect of a computer system that can be used to compromise a system during an attack
  8. 17. Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
  9. 20. Property of being accessible and usable on demand by an authorized entity
  10. 21. Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
  11. 24. Property of accuracy and completeness
  12. 26. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
  13. 27. A string of characters that allows access to a computer, interface, or system.
Down
  1. 1. The fear of being without a mobile device, or beyond mobile phone contact
  2. 2. A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
  3. 3. A software that detects and cleans comp
  4. 7. Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
  5. 8. A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
  6. 9. Potential cause of an unwanted incident, which can result in harm to a system or organization
  7. 10. The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
  8. 12. A humorous or malicious deception
  9. 14. the ability to control information about oneself
  10. 18. Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
  11. 19. Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
  12. 22. An autonomous and malicious software program propagating among computer networks
  13. 23. The person that a software program or hardware device is designed for.
  14. 25. Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
  15. 28. Measure of the criticality of a situation--the likelihood of something being attacked