Across
- 5. The right to control how your information is viewed and used, while being protected against threats or danger.
- 6. A type of malicious software that locks the computer screen or files, thus preventing or limiting a user from accessing their system and data until money is paid.
- 7. A technique by which cyber criminals steal potentially sensitive user information by injecting malicious JavaScript code in various forms/pages of targeted website.
- 9. A software program designed to take advantage of a flaw in a computer system, typically for malicious purposes
- 10. A Security incident in which a malicious threat actor gains access to systems without authorization.
- 11. Property of data which gives assurance that the data can only be accessed/modified by authorized users.
Down
- 1. Software code used as a quick-repair job for a computer program designed to resolve functionality issues, improve security or add new features.
- 2. The destruction of the data on a data storage device by removing its magnetism.
- 3. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
- 4. A social engineering technique through which a cybercriminal disguises themselves as a known or trusted source.
- 5. Format of a message or data in readable form; extremely vulnerable from a confidentiality perspective.
- 8. A documented, lowest level of security configuration allowed by an organization.
