Cybersecurity Awareness Week - 9/24

1234567891011121314
Across
  1. 3. a standalone malware computer program that replicates itself in order to spread to other computers
  2. 6. a network security system that controls incoming and outgoing network traffic based on a set of rules
  3. 7. a weakness of a system or facility holding information which can be exploited to gain access or violate system integrity
  4. 9. usually consists of eight bits
  5. 11. (abbreviation) a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period
  6. 13. (abbreviation) a way of injecting malicious scripts into web pages
  7. 14. type of software to detect unwanted programs on a computer
Down
  1. 1. a secret word or phrase that must be used to gain admission to something, you should never share yours with anyone!
  2. 2. generic name someone who seeks and exploits weaknesses in a computer system or computer network
  3. 3. a type of ransomware that attacked running Microsoft Windows operating systems in May 2017
  4. 4. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
  5. 5. refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed
  6. 8. the process of converting information or data into a code, especially to prevent unauthorized access
  7. 10. function of one way encryption that is normally used to check integrity of data
  8. 12. a type of malicious software designed to block access to a computer system until a sum of money is paid