CYBER CROSSWORD

12345678910111213
Across
  1. 3. / An unauthorized person seeking to maliciously disrupt or damage a system
  2. 5. / A string of letters, characters and numbers that must be used to gain access to a device, system or service
  3. 6. / Global system interconnected computer networks that uses standard communication protocol
  4. 8. / A characteristics or specific weakness that renders an organization or asset open to exploitation
  5. 10. / Never scribble private and confidential --------------- on desktop table or beneath the keyboard
  6. 12. / Malicious software that is inserted in your system, usually covertly, with an intent on compromising victim’s data
Down
  1. 1. / Unwanted and fraudulent e-mails, messages and advertisements that comes to your e-mail address
  2. 2. / Hardware and/or Software mechanism to prevent unauthorized users from accessing a computer network
  3. 4. / system invented by google that uses a test to establish if a user is human or robot
  4. 7. / A type of malware designed to block access to a system or service data until a sum of money is paid
  5. 8. / A tool that allows the user to remain anonymous while using internet by masking the location and encrypting traffic
  6. 9. / Always ---------- your computer when you leave your desk
  7. 11. / Cyber attack in which cyber criminals flood the network which make machine or network resource are unavailable to legitimate users
  8. 13. / Encoding information into ciphertext to assure that the confidentiality of, and access to, certain information about an entity is protected