Introduction to Cybersecurity
Across
- 4. Fraudulent attempt to steal sensitive data via deceptive emails.
- 6. Incident where data is accessed/stolen without permission.
- 9. Three core security goals: Confidentiality, Integrity, and _______.
- 10. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
- 1. Security system that monitors/controls network traffic (blocks unauthorized access).
- 2. Self-replicating malware that spreads between devices.
- 3. Process of encoding data to prevent unauthorized reading.
- 5. Malicious software designed to damage systems (e.g., viruses, trojans).
- 7. Person who exploits system vulnerabilities.
- 8. Software update to fix security flaws.