Cyber Security ACMH

1234567891011121314151617
Across
  1. 5. Malware that is loaded onto a computer and then run without the user's knowledge or knowledge of it's full effects.
  2. 6. Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.
  3. 11. Something that can cause harm to a system or organization.
  4. 13. The transformation of data to hide its information content.
  5. 14. Malware that passes information about a computer user's activities to an external party.
  6. 16. Intrusion detection system that also blocks unauthorized access when detected.
  7. 17. The process to verify that someone is who they claim to be when they try to access a computer or online service.
Down
  1. 1. Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.
  2. 2. Obtaining evidence of identity by two independent means.
  3. 3. Software intended to infiltrate and damage or disable computers.
  4. 4. The process of identifying, analyzing and evaluating risk.
  5. 7. A flaw or weakness that can be used to attack a system or organization.
  6. 8. Method used by criminals to try to obtain financial or other confidential information from internet users, usually through email.
  7. 9. A secret series of characters used to authenticate a person's identity.
  8. 10. Malware that replicates itself so it can spread to infiltrate other computers.
  9. 12. Someone who violates computer security for malicious reasons, kudos or personal gain.
  10. 15. Something that could cause an organization no to meet one of its objectives