Cybercross

123456789101112131415
Across
  1. 6. A piece of software or a sequence of commands that takes advantage of a software vulnerability or security flaw
  2. 8. The conversion of data from a readable format into an encoded format.
  3. 9. A sequence of words or other text that a person uses to authenticate their identity.
  4. 10. A principle that ensures timely and reliable access to information when required
  5. 11. A network of hijacked devices used to carry out various scams and cyber attacks.
  6. 13. A program or file designed to harm a computer, server, client, or computer network.
  7. 14. A process of verifying users' identity.
  8. 15. A security violation in which information is accessed by an unauthorized individual or system.
Down
  1. 1. A program that slows down your computer and watches your online activities.
  2. 2. A principle that ensures information is protected from unauthorized disclosure
  3. 3. A principle that ensures information is not modified or deleted by unauthorized parties.
  4. 4. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's established security policies.
  5. 5. Act that involves someone seeking entry to a restricted area without proper authentication.
  6. 7. A fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
  7. 12. Any circumstance or event with the potential to steal or damage data or disrupt computing systems.