NCSAM 2024
Across
- 2. Ensuring timely and reliable access to information.
- 5. the state of keeping or being kept secret or private.
- 7. an attack that holds data hostage via the use of encryption
- 8. Software or Operat updates that address bugs or vulnerabilities within a program or product.
- 11. The most commonly used wireless communication technology - you might be using it right now.
- 13. the state or condition of being free from being observed or disturbed by other people.
- 14. Shorter term for malicious software
- 15. internal data being made accessible to external entities without authorization.
- 18. the use of deception to manipulate individuals into divulging confidential information to be used for fraudulent purposes. (two words, no space)
- 19. An exploit not known until it has been used (two words, no space)
- 20. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation.
- 21. wrongful or criminal deception intended to result in financial or personal gain.
Down
- 1. A link between networks that is typically encrypted to provide a secure, isolated, private path of communication. (You might be using this right now)
- 3. a potential exploitable weakness in a system
- 4. ensuring data is complete, trustworthy, and has not been modified or accidentally altered
- 6. A security tool, which may be a hardware or software solution that is used to filter network traffic.
- 9. The process of identifying, assessing, and prioritizing risks (two words, no space)
- 10. a social engineering attack that attempts to gather information about victims
- 12. A malicious program that can spread without user interaction
- 16. A malicious program that is typically designed to damage or destroy data.
- 17. Software that secretly records your keyboard input