Cyber Puzzle

12345678910
Across
  1. 1. The form of encryption that requires a single key
  2. 5. An important process that verifies a user is really who they are; many different ways this can be done.
  3. 7. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  4. 9. The _________ is used to verify that data is not modified, tampered with, or corrupted
  5. 10. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
Down
  1. 2. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  2. 3. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. 4. unique address that identifies a device on the internet or a local network.
  4. 6. Special virus that moves from computer to computer without human interaction.
  5. 8. An ________ is a program or code that makes use of the vulnerability in an application or system.
  6. 9. a person who uses computers to gain unauthorized access to data.