Across
- 1. A process or measure used to verify a users identity.
- 5. A type of malware that denies a user's access to a system or data until a sum of money is paid.
- 6. An unauthorized user who attempts to or gains access to an information system.
- 7. A computer program that can spread by making copies of itself.
- 9. Software that compromises the operation of a system by performing an unauthorized function or process
- 11. A flaw or weakness in the design or implementation of an information system or its environment that could be exploited to adversely affect an organization's assets or operations.
- 12. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
- 13. A collection of computers compromised by malicious code and controlled across a network
- 15. The ability of individuals to understand and exercise control over how information about themselves may be used by others.
- 16. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
- 17. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- 18. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- 19. An individual, group, organization, or government that conducts or has the intent to conduct detrimental activities.
Down
- 2. A software program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents
- 3. A security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two.
- 4. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
- 8. The activities that address the short-term, direct effects of an incident and may also support short-term recovery
- 10. Converting data into a form that cannot be easily understood by unauthorized people.
- 14. The unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information
- 15. An attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand, usually for financial gain.