Cyber Security Puzzle

123456789101112131415
Across
  1. 5. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  2. 7. the fabrication of a false online identity by a cybercriminal for the purposes of deception, fraud, or exploitation
  3. 9. an attack in which someone sends unsolicited messages to a Bluetooth-enabled device
  4. 11. An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
  5. 14. process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
  6. 15. the physical opening where a data cable can be plugged in
Down
  1. 1. an ethical hacking technique used to gather as much data as possible about a specific targeted computer system, an infrastructure and networks to identify opportunities to penetrate them
  2. 2. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
  3. 3. a form of testing that is performed with knowledge of a target system's internals
  4. 4. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application
  5. 6. an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device.
  6. 8. capability to limit network traffic between networks and/or information systems.
  7. 10. The use of mathematical techniques to provide security services, such as confidentiality, data integrity, entity authentication, and data origin authentication.
  8. 12. a design and programming philosophy that focuses on formally correct and verifiable input handling throughout all phases of the software development lifecycle
  9. 13. The unauthorized transfer of information from an information system.