🧩 ISCC CROSSWORD SET (Chapter 1 & 7)

1234567891011121314151617181920212223242526272829303132333435363738394041424344
Across
  1. 3. Instructions that tell a computer what to do
  2. 4. Organized collection of data
  3. 5. Raw facts without meaning
  4. 6. Copy of data for recovery
  5. 8. Hidden method to bypass security controls
  6. 10. Attack that overwhelms system resources
  7. 14. Secure combination of words for access
  8. 15. Processed data useful for decision making
  9. 16. Malicious software disguised as legitimate
  10. 17. Information available when needed
  11. 19. Converting data into unreadable form
  12. 20. Data entered into a system
  13. 22. Information arranged properly
  14. 24. Converting data into information
  15. 25. Users who interact with information systems
  16. 26. Possibility of damage or loss
  17. 28. Protection against threats and risks
  18. 29. Saving data for future use
  19. 31. Distributed attack using multiple devices
  20. 33. Harmful software designed to damage systems
  21. 35. Program that spreads when executed
  22. 36. Instructions or rules for using a system
  23. 38. Electronic device that processes data
  24. 40. Network of infected devices controlled remotely
  25. 41. Information useful to the user
  26. 42. Manipulating people for information
  27. 43. Self-replicating malware spreading automatically
  28. 44. Interrelated components working together
Down
  1. 1. Verifying user identity
  2. 2. Potential danger to systems
  3. 7. Fraudulent attempt to obtain sensitive data
  4. 9. Software that secretly collects user data
  5. 11. Physical components of a computer system
  6. 12. Fake website or identity deception
  7. 13. Authentication using physical traits
  8. 18. System that filters network traffic
  9. 21. Information whose value exceeds its cost
  10. 23. Information free from errors
  11. 27. Information that can be proven correct
  12. 30. Protection of personal information
  13. 32. Results produced by a system
  14. 34. Small files storing user information
  15. 37. Moral principles in system usage
  16. 39. Malware that locks files for payment
  17. 41. Restoring systems after failure