Cyber Security

12345678910
Across
  1. 3. a technology that creates a secure, encrypted connection over an insecure network like the Internet.
  2. 4. practice of sending spam emails by impersonating legitimate sources.
  3. 5. a situation in which an attacker can physically look at a device’s screen or keyboard and enter passwords to obtain personal information
  4. 8. an error in the design or implementation of a system that can be exploited to cause unexpected or undesirable behaviour
  5. 9. the process of transforming an ordinary message (plaintext) into a meaningless message (ciphertext)
  6. 10. Only authorized users and processes should be able to access or modify data
Down
  1. 1. Authorized users should be able to access data whenever they need to do so
  2. 2. a hardware or software-based network security device that monitors all incoming and outgoing traffic
  3. 6. a type of attack on computing devices in which an attacker attempts to steal the identity of a legitimate user and pretend to be someone else
  4. 7. malware to extort money from users for ransom by gaining unauthorized access to sensitive user information and demanding payment to delete or return that information from the user.