Cybersecurity Vocab

123456789101112
Across
  1. 3. program designed to breach the security of a computer system.
  2. 9. verifying identity.
  3. 10. info is stolen without knowledge or authorization.
  4. 11. attempt by hackers to damage or destroy a computer network or system.
  5. 12. self replicating and infects other computers while remaining active on other infected systems.
Down
  1. 1. preventing and mitigating attacks on computer systems.
  2. 2. software that enables a user to obtain covert information from one's computer activities.
  3. 4. software that blocks access to a computer until a sum of money is paid.
  4. 5. fake e-mails to gain access to credit cards or personal information.
  5. 6. area of control or sphere of knowledge.
  6. 7. the process of converting info or date into a code.
  7. 8. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer.