Cybersecurity vocabulary

12345678910111213141516171819202122232425
Across
  1. 3. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
  2. 5. The process of transforming plaintext into ciphertext.
  3. 6. The application of one or more measures to reduce the likelihood of an unwanted occurrence and/or lessen its consequences.
  4. 9. malicious code
  5. 11. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
  6. 12. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  7. 15. A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.
  8. 16. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  9. 19. A digital form of social engineering to deceive individuals into providing sensitive information.
  10. 20. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  11. 22. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  12. 23. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  13. 25. Qualify a cryptographic key that may be widely published and is used to enable the operation of an asymmetric cryptographic algorithm.
Down
  1. 1. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. 2. A capability to limit network traffic between networks and/or information systems.
  3. 4. The property whereby information, an information system, or a component of a system has not been modified or destroyed in an unauthorized manner.
  4. 7. The property of being accessible and usable upon demand.
  5. 8. Qualify public key cryptography
  6. 10. Determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  7. 13. Verifying the identity or other attributes of an entity (user, process, or device).
  8. 14. A collection of computers compromised by malicious code and controlled across a network.
  9. 17. Software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner.
  10. 18. The assurance that the confidentiality of, and access to, certain information about an entity is protected.
  11. 21. Faking the sending address of a transmission to gain illegal [unauthorized] entry into a secure system.
  12. 24. An unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.