🧩 ISCC CROSSWORD SET (Chapter 1 & 7)
Across
- 3. Instructions that tell a computer what to do
- 4. Organized collection of data
- 5. Raw facts without meaning
- 6. Copy of data for recovery
- 8. Hidden method to bypass security controls
- 10. Attack that overwhelms system resources
- 14. Secure combination of words for access
- 15. Processed data useful for decision making
- 16. Malicious software disguised as legitimate
- 17. Information available when needed
- 19. Converting data into unreadable form
- 20. Data entered into a system
- 22. Information arranged properly
- 24. Converting data into information
- 25. Users who interact with information systems
- 26. Possibility of damage or loss
- 28. Protection against threats and risks
- 29. Saving data for future use
- 31. Distributed attack using multiple devices
- 33. Harmful software designed to damage systems
- 35. Program that spreads when executed
- 36. Instructions or rules for using a system
- 38. Electronic device that processes data
- 40. Network of infected devices controlled remotely
- 41. Information useful to the user
- 42. Manipulating people for information
- 43. Self-replicating malware spreading automatically
- 44. Interrelated components working together
Down
- 1. Verifying user identity
- 2. Potential danger to systems
- 7. Fraudulent attempt to obtain sensitive data
- 9. Software that secretly collects user data
- 11. Physical components of a computer system
- 12. Fake website or identity deception
- 13. Authentication using physical traits
- 18. System that filters network traffic
- 21. Information whose value exceeds its cost
- 23. Information free from errors
- 27. Information that can be proven correct
- 30. Protection of personal information
- 32. Results produced by a system
- 34. Small files storing user information
- 37. Moral principles in system usage
- 39. Malware that locks files for payment
- 41. Restoring systems after failure