Cybersecurity terms

12345678910111213
Across
  1. 4. Barrier between a trusted network and an untrustworthy network.
  2. 7. A collection of programs or software tools that allow hackers to remotely access and control a computer or network.
  3. 10. A form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information.
  4. 12. It refers to protecting information from unauthorized user
  5. 13. A form of malware used by hackers to spy on you and your computer activities.
Down
  1. 1. Visit the global policy database and find the title of MFC-STA-023
  2. 2. Also referred to as two-factor authentication
  3. 3. Short for malicious software
  4. 5. The process of converting information into a code to prevent unauthorized access.
  5. 6. It means data are trustworthy and have not been accidentally altered or modified by an unauthorized access
  6. 8. It is the process of converting coded or encrypted data to its original form.
  7. 9. It means data are accessible when you need them
  8. 10. It relates to rights to control the sharing and use of one’s personal information
  9. 11. A network of computers that have been infected with a virus, and now are working continuously in order to create security breaches.