Unit 1 What is cybersecurity?

12345678
Across
  1. 1. protocols for encrypting or decrypting information in order to protect computer systems, networks and data from cyber attacks
  2. 5. assurance that systems and data are accessible by authorized users when and where needed
  3. 7. the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data
  4. 8. the protection of information from people who are not authorized to view it
Down
  1. 1. the study of computational thinking which describes a step by step process
  2. 2. a widely accepted security measure that should be guaranteed in every secure system
  3. 3. the usage of deceptive emails and websites to maliciously gather personal information
  4. 4. identify theft, stealing money, stealing private information controlling private computers
  5. 6. ensures that information is protected from unauthorized or unintentional alteration