Cybersecurity Amelie BTS1

12345678910
Across
  1. 2. A group of Internet-connected devices, each of which runs one or more bots.
  2. 5. Completely Automated Public Turing test to tell Computers and Humans Apart.
  3. 8. information that is officially secret.
Down
  1. 1. An occasion when private information can be seen by people who should not be able to see it.
  2. 3. deriving from or relating to a previously unknown vulnerability to attack in some software.
  3. 4. (Acronym) - set of tools and processes designed to help organizations detect, prevent, and manage the unauthorized access, transmission, or leakage of sensitive data security strategy.
  4. 6. (Acronym) - in the US, a law that states the level of care that employer health insurance plans must provide and the rules for the exchange and protection of personal medical information.
  5. 7. (Acronym)- The use of two or more different types of proof of your identity when you are doing something online.
  6. 9. Programs that surreptitiously monitor and report the actions of a computer user.
  7. 10. theft the fraudulent practice of using another person's name and personal information in order to obtain credit, loans, etc.