Across
- 5. The process of encoding information in such a way that only authorized parties can access it.
- 6. A person who uses computers to gain unauthorized access to data.
- 7. Characterized by malice; intending or intended to do harm.
- 8. As discussed, malicious software.
- 10. The gaining of unauthorized access to data in a system or computer.
- 12. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 16. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- 18. The state of being free from danger or threat. In cybersecurity, it refers to the protection of information systems.
- 22. The action of protecting, or the state of being protected. (While not strictly a cybersecurity prefix, it's a foundational concept).
- 23. The use of computers and the internet to conduct warfare in cyberspace.
- 24. Software used to prevent, detect, and remove malicious software.
Down
- 1. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
- 2. The practice of protecting systems, networks, and programs from digital attacks.
- 3. Software that enables a user to obtain secret information about another's computer activities by secretly transmitting data from their hard drive.
- 4. Broader than antivirus, it protects against various forms of malware, not just viruses.
- 9. A hacker who uses their skills for defensive purposes, often hired to test system vulnerabilities.
- 11. Criminal activities carried out using computers or the internet.
- 13. The quality of being trustworthy or of performing consistently well.
- 14. An attempt by hackers to damage or destroy a computer network or system.
- 15. The process of converting encrypted data back into its original form.
- 17. Permanent software programmed into a read-only memory.
- 19. The programs and other operating information used by a computer.
- 20. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network.
- 21. The action or process of identifying the presence of something.
