Cyber Security Threads

12345678910111213
Across
  1. 2. An attack that floods a network with excessive traffic, disrupting services
  2. 6. Ensures that data is accurate and has not been tampered with
  3. 9. Falsifying data to deceive systems or users
  4. 10. The ability of a system to recover quickly from disruptions or attacks
  5. 12. Ensures that systems are accessible and functional when needed
Down
  1. 1. Ensures that information is accessible only to those authorized to access it
  2. 3. The process of converting information into a secret code
  3. 4. A model that describes the stages of a cyberattack ( 2 words )
  4. 5. A weakness in a system that can be exploited by attackers
  5. 7. A type of malware disguised as legitimate software
  6. 8. A potential danger or harmful event in cybersecurity
  7. 11. A security system that monitors and controls network traffic
  8. 13. An attempt to exploit a system or network