Across
- 3. A collection of computers connected together.
- 5. A copy of data made in case the original is lost.
- 6. Protects data by scrambling it so others can't read it.
- 9. Personal information that should be protected.
- 14. A trick used to steal information by pretending to be trustworthy.
- 15. A weakness, flaw, or error in a system's design, implementation, internal controls, or security procedures
- 16. Unwanted or junk email messages.
- 17. When legitimate users are denied access to computer services by overloading the service with requests.
- 18. The tangible, physical components of computing and networking systems that require protection
- 21. A digital wall that blocks unauthorized access.
- 22. Malicious software that makes data or systems unusable until the victim makes a payment.
- 23. Software that is designed to detect, stop and remove viruses and other kinds of malicious software.
Down
- 1. Any potential, often malicious, event or action that seeks to exploit vulnerabilities.
- 2. Recently discovered vulnerabilities, not yet known to vendors or antivirus companies, that hackers can exploit
- 4. Ensures that data, systems, and resources are accessible to authorized users when needed.
- 6. A program or system designed to take advantage of a particular error or security vulnerability in computers or networks.
- 7. Updates applied to firmware or software to improve security.
- 8. Manipulating people into carrying out specific aactions, or divulging information, that's of use to an attacker.
- 10. Ensures that sensitive information is accessed only by authorized users.
- 11. Ensures that sensitive information is accessed only by authorized users.
- 12. Harmful software designed to damage systems.
- 13. A person who breaks into systems legally or illegally.
- 14. A secrete word or phrase used to log into an account.
- 19. Where shared compute and storage resources are accessed as a service, instead of hosted locally.
- 20. A type of malware or virus disguised as legitimate software, that is used to hack into the victims computer.
