Across
- 2. The process of verifying the identity or other attributes of an entity (user, process, or device).
- 3. A system designed to prevent unauthorized access to or from a computer network.
- 8. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
- 10. Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
- 11. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
- 12. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin.
- 14. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
- 17. A type of malware that can collect and transmit private user information without the user’s knowledge or consent.
- 18. A method of scrambling data so that only authorized users or systems can access it.
- 19. A network of compromised computers used to carry out cyberattacks on other systems. Hackers will often infect computers using malware, then control those devices remotely to destroy data.
- 20. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
- 21. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
Down
- 1. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
- 4. The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
- 5. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
- 6. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
- 7. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
- 8. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites.
- 9. A secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-Fi.
- 13. An unauthorized user who attempts to or gains access to an information system.
- 15. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
- 16. Short for malicious software, is any type of harmful software designed to damage or disrupt a computer system