Cyber-Security Amanda Peart

1234567891011121314151617181920212223242526272829
Across
  1. 1. C of the CIA triad
  2. 2. computer operating system for Apple Computer's MacIntosh line of personal computers and workstations
  3. 3. the physical components that a computer system requires to function
  4. 6. a bit of data, which is sent by a sender, to a recipient
  5. 11. the software that supports a computer's basic functions
  6. 12. a person who uses computers to gain unauthorized access to data
  7. 13. I if the CIA Triad
  8. 14. to decode (a message) with or without previous knowledge of its key
  9. 17. encompasses measures taken to improve the security of an application
  10. 20. a file that exists of cells in rows and columns and can help arrange, calculate and sort data
  11. 21. a legal instrument governing the use or redistribution of software
  12. 26. heads the national effort to investigate and prosecute internet crimes, including "cyber-based terrorism, espionage, computer intrusions, and major cyber fraud"
  13. 27. the programs and other operating information used by a computer
  14. 29. A fo the CIA Triad
Down
  1. 1. allows the user to interact with the computer by typing in commands
  2. 4. caused 1 billion user accounts may have been comprised
  3. 5. nothing to do with a certain well-recognized US intelligence agency
  4. 7. the field of work in which someone manages one or more systems
  5. 8. convert (information or data) into a cipher or code, especially to prevent unauthorized access
  6. 9. each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet
  7. 10. the art of writing or solving codes
  8. 15. the study of codes, or the art of writing and solving them
  9. 16. a method of encrypting alphabetic text by using a series of interwoven Caesar ciphers, based on the letters of a keyword
  10. 18. A piece of software that prevents pop-up advertisements from being displayed
  11. 19. a hardware or software component that stores data
  12. 22. activity that either targets or uses a computer, a computer network or a networked device
  13. 23. a software program that runs on your computer
  14. 24. job is to protect online data from being compromised
  15. 25. developed by Microsoft Corporation to run personal computers
  16. 28. a way for software developers to fine-tune a product to make it the best it can be