Across
- 3. Security principle ensuring that data is not altered or tampered with
- 4. Type of malware that locks data until a payment is made
- 6. Permission to access certain resources or perform actions
- 8. Fraudulent attempt to get sensitive information by pretending to be a trusted empty
- 9. Company that provides users access to the Internet
- 11. Malicious program disguised as legitimate software
- 12. Network of connected devices that communicate over the Internet
- 13. Unauthorized takeover of a system, network or online session
- 15. Process that converts data into unreadable code to protect it
- 17. Manipulating people to reveal confidential information
Down
- 1. Weak Points in a system that attackers can exploit
- 2. Security principle ensuring that systems and data are accesible when needed
- 5. Process of verifying someone's identity before granting access
- 7. Secret string of characters used for authentication
- 10. Probability that a threat will exploit a vulnerability
- 14. Software that secretly collects user data and send it to others
- 16. Risks that come from employees or people inside an organization
