Across
- 5. Process of encoding information to make it secure.
- 7. Study and practice of techniques for secure communication in the presence of third parties.
- 8. Authentication techniques based on unique biological characteristics such as fingerprints or retinal scans.
- 11. Practice of protecting systems, networks, and programs from digital attacks.
- 16. Secret code used to gain access to a computer, network, or service.
- 18. Malicious software that encrypts files and demands payment for their release.
- 19. Process of confirming the truth of an attribute of a single piece of data.
- 20. Software update designed to fix problems with, or improve a computer program or its supporting data.
- 21. Malicious software that replicates itself and spreads to other computers.
Down
- 1. Incident where sensitive, protected, or confidential information is accessed or disclosed without authorization.
- 2. Weakness in a system's defenses that can be exploited by a threat.
- 3. Network of private computers infected with malicious software and controlled as a group.
- 4. Person who uses technical knowledge to gain unauthorized access to computer systems.
- 6. Security system designed to prevent unauthorized access to or from a private network.
- 7. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
- 9. Malicious software disguised as legitimate software.
- 10. Software intended to damage or disable computers and computer systems.
- 12. Software designed to detect and remove computer viruses and other malicious software.
- 13. Attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- 14. Secure network connection that allows users to access the internet privately.
- 15. Interconnected group of computers and other devices capable of exchanging data.
- 17. Unsolicited or undesired electronic messages, typically advertising.