Across
- 6. A piece of software or a sequence of commands that takes advantage of a software vulnerability or security flaw
- 8. The conversion of data from a readable format into an encoded format.
- 9. A sequence of words or other text that a person uses to authenticate their identity.
- 10. A principle that ensures timely and reliable access to information when required
- 11. A network of hijacked devices used to carry out various scams and cyber attacks.
- 13. A program or file designed to harm a computer, server, client, or computer network.
- 14. A process of verifying users' identity.
- 15. A security violation in which information is accessed by an unauthorized individual or system.
Down
- 1. A program that slows down your computer and watches your online activities.
- 2. A principle that ensures information is protected from unauthorized disclosure
- 3. A principle that ensures information is not modified or deleted by unauthorized parties.
- 4. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's established security policies.
- 5. Act that involves someone seeking entry to a restricted area without proper authentication.
- 7. A fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- 12. Any circumstance or event with the potential to steal or damage data or disrupt computing systems.
