Cyber Security CrossWord Puzzel

1234567891011121314151617
Across
  1. 7. Data theft by unauthorized users,Equipment damage by fire etc. and Malware via infected USB flash drive are examples of _____________.
  2. 8. _______________ is any crime perpetrated using computers and networks.
  3. 10. A__________ monitored a network, blocking dangerous content such as viruses.
  4. 11. _____________________is all the activities related to identifying , assessing and managing the vulnerabilities , threats and attacks originating from cyberspace.
  5. 13. Viruses, trojans and worms are examples of __________________________.
  6. 15. An ethical hacker.
  7. 16. Your favorite teacher.
  8. 17. A statement of an intention to inflict harm or damage .
Down
  1. 1. Someone who hacks in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  2. 2. Your favorite class.
  3. 3. __________________________is all the activities related to identifying , assessing and managing vulnerabilities , threats and attacks on computer systems.
  4. 4. The exposure to the possibility of the attacked or harmed.
  5. 5. Actual action that causes harm or damage.
  6. 6. A blend between an ethical hacker and a cracker.
  7. 9. __________________is any activity during which a computer system or computer network is accessed, or its data is accessed, modified or deleted without proper authorization.
  8. 12. An action taken to counteract the threat.
  9. 14. ________________refers to any data or resources that can be accessed via a network or the space where the internet operates.