CyberOctober

12345678910111213
Across
  1. 3. Utilization of providers servers to store, manage, and process your data instead of using local systems
  2. 5. a form of malware that holds a victim's data hostage and requests for a payment to release it
  3. 7. the practice of making a copy of data on a different location
  4. 9. A software program that monitors a computer system for known examples of malicious code
  5. 10. a weakness in an asset that a threat can benefit from
  6. 11. ensuring implementer is different from approver to prevent fraud and errors
  7. 13. ways to trick a user into entering valid credentials at a fake website
Down
  1. 1. a party that uses knowledge and skill to intrude into a system
  2. 2. A generic term for a number of different types of malicious code
  3. 4. A circumstance that interrupts the correct operation of system and services
  4. 6. is simply listening to a private conversation
  5. 8. ensure data is accessible for those who need to use it
  6. 12. the possibility of something bad happening