Project 3 Part One

12345678
Across
  1. 2. being permitted to use one's own equipment rather than being forced to utilize one given by the government
  2. 5. the process of studying information systems in order to learn about their hidden features.
  3. 6. a fraudulent behavior in which a person establishes a fictitious persona or phony identity on a social networking service, generally with the intention of luring a specific victim in.
  4. 7. providing credit or acknowledgement of their effort to the creator of the original work
  5. 8. a single attacking party that has control over a network of machines infected with malware.
Down
  1. 1. one of the most basic and well-known encryption methods
  2. 2. a cyber assault in which sensitive, confidential, or otherwise protected material has been accessed and/or disclosed without permission.
  3. 3. a harmful method of persuading a user to click on something other than what the user expects
  4. 4. ____ is the result of encryption performed on plaintext using an algorithm, called a cipher.
  5. 5. These three letters represent the three Cs: confidentiality, integrity, and availability.