Basics of Cyber

123456789101112131415161718192021
Across
  1. 3. Creates a method to keep access to a machine or network
  2. 4. Hackers for Good
  3. 7. Information not disclosed to unauthorized individuals
  4. 11. Purposefully Malicious Hackers
  5. 13. Propagates like a virus, but uses network services to move around. Executes on its own once it finds a host
  6. 14. Users must confirm identity to access data and systems
  7. 16. Computer Program/part of a program that has damaging/unwanted effects on computer
  8. 17. Leaving a piece of storage in an open location
  9. 19. Proof of delivery and proof of sender’s identity
  10. 20. Authorized users are able to access info quickly and easily, Systems work even during difficult times
  11. 21. Emails pretending to be legit companies
Down
  1. 1. Uses made up scenario
  2. 2. Data is accurate and complete, Data is not altered or destroyed
  3. 5. Favor for a favor
  4. 6. Psychological manipulation to get people to perform actions or reveal confidential information
  5. 8. Gathers data and sends it to another entity
  6. 9. Hundreds or millions of computer that have been compromised
  7. 10. Sits quietly until a condition is met
  8. 12. Looks like something useful. Could install backdoors, rootkits, or turn your machine into a zombie
  9. 15. Self-replicating software, attaches to another program or file. Only runs when the program or file is opened.
  10. 18. Follow authorized user into secure area