Cybersecurity Week 1

12345678910
Across
  1. 6. Short for malicious software designed to obtain information from a computer without the user's consent
  2. 7. Protection of information assets within internetworked information systems
  3. 9. Ensures the timely and reliable access and use of information systems
  4. 10. Full use of a vulnerability for the benefit of an attacker
Down
  1. 1. Protection of information from authorized access and disclosure
  2. 2. A protected string of characters that authenticate a computer user to a system
  3. 3. the process of taking an unencrypted message and applying a mathematical function to produce an encrypted message
  4. 4. The protection of information from unauthorized modification
  5. 5. A system or combination of systems that enforces a boundary between two or more networks
  6. 8. An individual who attempts to gain unauthorized access to a computer system