Cybersecurity Crossword Puzzle

1234567891011
Across
  1. 3. part of the CIA triad that ensures no unauthorized access to sensitive data
  2. 5. a deceptive technique where someone pretends to be from another source or entity to gain trust, access, or information
  3. 7. A type of malware that propagates across a network without the help of a user
  4. 8. denial of _________
  5. 9. a wireless hijacking attack involving a rogue access point
  6. 11. part of the CIA triad that ensures access to data is readily available
Down
  1. 1. a type of social engineering where attackers send fraudulent messages in an attempt to trick the user into giving them information
  2. 2. a type of malware that blocks user access to a machine or data until they pay a large fee to the attacker
  3. 4. man in the ________
  4. 6. part of the CIA triad that ensures accuracy and trustworthiness of data
  5. 10. malware that disguises itself as a harmless program