Cybersecurity Crossword

12345678910111213141516171819
Across
  1. 1. A process or measure used to verify a users identity.
  2. 5. A type of malware that denies a user's access to a system or data until a sum of money is paid.
  3. 6. An unauthorized user who attempts to or gains access to an information system.
  4. 7. A computer program that can spread by making copies of itself.
  5. 9. Software that compromises the operation of a system by performing an unauthorized function or process
  6. 11. A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations.
  7. 12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  8. 13. A collection of computers compromised by malicious code and controlled across a network
  9. 15. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
  10. 16. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  11. 17. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  12. 18. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  13. 19. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Down
  1. 2. A software program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents
  2. 3. A security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two.
  3. 4. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
  4. 8. The activities that address the short-term, direct effects of an incident and may also support short-term recovery
  5. 10. Converting data into a form that cannot be easily understood by unauthorized people.
  6. 14. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information
  7. 15. An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain.