Across
- 3. cybersecurity principle that involves maintaining the consistency, accuracy and trustworthiness of data so only authorized alterations are allowed
- 5. type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning
- 6. a weakness that can be exploited by cybercriminals to gain unauthorized access to a computer system
- 7. Malware that encrypts or locks a victim's computer files until the victim meets their demands
Down
- 1. cyber attack that intercepts a communication between two systems and allows an attacker to "listen" to the communication.
- 2. a network of hijacked computer devices that have been linked together to carry out various scams and cyberattacks
- 4. any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access on a computer system, network, or software application