Across
- 3. part of the CIA triad that ensures no unauthorized access to sensitive data
- 5. a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
- 7. A type of malware that propagates across a network without the help of a user
- 8. denial of _________
- 9. a wireless hijacking attack involving a rogue access point
- 11. part of the CIA triad that ensures access to data is readily available
Down
- 1. a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
- 2. a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
- 4. man in the ________
- 6. part of the CIA triad that ensures accuracy and trustworthiness of data
- 10. malware that disguises itself as a harmless program
