Cybersecurity

123456789101112131415161718192021
Across
  1. 2. The process of verifying the identity or other attributes of an entity (user, process, or device).
  2. 3. A system designed to prevent unauthorized access to or from a computer network.
  3. 8. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.
  4. 10. Additional or alternative systems, sub-systems, assets, or processes that maintain a degree of overall functionality in case of loss or failure of another system, sub-system, asset, or process.
  5. 11. A computer program that can replicate itself, infect a computer without permission or knowledge of the user, and then spread or propagate to another computer.
  6. 12. A type of cyber attack that locks users out of their computer systems until they pay a ransom, typically in the form of cryptocurrency, such as Bitcoin.
  7. 14. The abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.
  8. 17. A type of malware that can collect and transmit private user information without the user’s knowledge or consent.
  9. 18. A method of scrambling data so that only authorized users or systems can access it.
  10. 19. A network of compromised computers used to carry out cyberattacks on other systems. Hackers will often infect computers using malware, then control those devices remotely to destroy data.
  11. 20. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself.
  12. 21. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
Down
  1. 1. A characteristic or specific weakness that renders an organization or asset (such as information or an information system) open to exploitation by a given threat or susceptible to a given hazard.
  2. 4. The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
  3. 5. A person, structure, facility, information, and records, information technology systems and resources, material, process, relationships, or reputation that has value.
  4. 6. The activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation.
  5. 7. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information.
  6. 8. A type of cyber attack that attempts to fool users into providing sensitive information, such as passwords or credit card details, via fake emails and websites.
  7. 9. A secure online service that allows users to connect remotely to another network, such as their workplace network or home Wi-Fi.
  8. 13. An unauthorized user who attempts to or gains access to an information system.
  9. 15. An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity.
  10. 16. Short for malicious software, is any type of harmful software designed to damage or disrupt a computer system