Cybersecurity

12345678910111213141516
Across
  1. 6. A security measure that involves verifying the identity of a user or system.
  2. 7. Secret code that must be entered to access a computer or network.
  3. 10. The study of secure communication and storage of information.
  4. 12. Barrier that prevents unauthorized access to or from a private network.
  5. 13. The practice of stealing personal information to commit fraud.
  6. 15. Person who gains unauthorized access to computer systems for malicious purposes.
  7. 16. An attack that involves flooding a network with traffic to make it unavailable.
Down
  1. 1. Unauthorized access, disclosure, or acquisition of sensitive information.
  2. 2. Type of malicious software that can replicate and spread to other computers.
  3. 3. Software designed to harm or exploit computers or networks.
  4. 4. Process of converting information or data into a code to prevent unauthorized access.
  5. 5. A program or set of programs that runs on a computer to carry out tasks.
  6. 8. Software designed to detect and remove computer viruses.
  7. 9. A set of rules governing the exchange or transmission of data.
  8. 11. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
  9. 14. Type of malicious software disguised as legitimate software.