CyberSecurity Crossword

12345678910111213141516
Across
  1. 3. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction
  2. 4. Should be constructed of upper and lower case letters, numbers, and special characters
  3. 8. verifying identity
  4. 9. a type of software that is designed to display advertisements on a user's computer or device.
  5. 10. a type of software or hardware device that is designed to capture and record keystrokes made on a computer or other device
  6. 13. The “I” in the C-I-A Triad; protection from unauthorized changes
  7. 14. The “A” in the C-I-A Triad. It ensures authorized users have access
  8. 16. A fraudulent email purportedly from a reputable company attempting to get personal information
Down
  1. 1. Threatening behavior facilitated through electronic means such as texting
  2. 2. A type of malicious software designed to block access to a computer system until a sum of money is paid
  3. 5. weakness in a computer system that could be exploited to violate the system’s security
  4. 6. Software that scans a device or a network to detect security threats, alert the user, and neutralize malicious code
  5. 7. Facebook, Twitter, Instagram, etc. (Two words)
  6. 11. The process of taking plain text and scrambling it into an unreadable format
  7. 12. the act of secretly listening to or monitoring the conversations or communications of others without their knowledge or consent
  8. 15. enables a user to connect securely from outside to their business network, even though they are not located on their office premises