Across
- 2. requiring users to do multiple authentications checks
- 4. ensuring systems are available
- 8. the use of computers or networks to perform unethical activity
- 10. ensuring private data remains private
- 11. the process of transforming data into secret code to prevent theft
- 12. process where security professionals report vulnerabilities within the system
- 15. psychological feelings and characteristics for an individual
- 16. the state of being protected or safe
- 18. not likely to cause harm
- 19. ensuring data is not changed without correct authentication
Down
- 1. the process of proving something is true
- 3. automated measurements to discover physical or behavioral characteristics
- 5. a method to bypass regular authentication. Usually used by law enforcement
- 6. the use of hacking to hurt or benefit a political cause
- 7. the state of being exposed and the potential of being harmed
- 9. the process of simulating cyberattacks on a system
- 13. people who can help protect the digital world
- 14. individuals that will be using the system created
- 17. an act that is considered shameful or wrong
- 18. irresponsible or destructive action performed by a criminal
