Across
- 5. Harmful software designed to damage, disrupt, or gain unauthorized access to a computer system
- 8. The process of determining what an authenticated user is allowed to access or do
- 9. A security system that monitors and controls incoming and outgoing network traffic
- 12. The process of proving who you are, such as logging in with a password or fingerprint
- 14. A type of malware that spreads by attaching itself to files and can damage or delete data
- 15. Authentication a security method that requires two forms of verification to access an account
Down
- 1. The process of converting data into a coded format so only authorized users can read it
- 2. Ensuring systems and data are accessible when needed
- 3. Malware that disguises itself as legitimate software to trick users into installing it
- 4. Engineering manipulating people into giving up confidential information rather than hacking systems
- 6. Triad a cybersecurity model that includes confidentiality, integrity, and availability
- 7. A cyber attack where scammers send fake emails or messages to trick people into giving personal information
- 10. Making sure data is accurate and has not been altered without permission
- 11. Ensuring that information is only accessible to authorized users
- 13. A secret word or phrase used to access an account or system
