Across
- 3. Attempt to breach security
- 6. Verifying user identity
- 7. Malware that encrypts files and demands payment
- 9. Deceptive emails trying to steal information
- 10. Relating to computers and networks
- 12. Potential danger to a system
- 14. Checking for vulnerabilities
- 15. Self-replicating malicious code
- 17. Person attempting unauthorized access
- 20. Software update to fix vulnerabilities
- 21. Taking advantage of a vulnerability
- 22. Security event that may indicate a breach
- 23. Review of security controls
- 25. Information stored on a system
- 28. Attack that disrupts service availability
- 31. Restoring data after a loss
- 32. Malware disguised as legitimate software
- 34. Connected computers and devices
- 36. Weakness that can be exploited
- 37. Unsolicited bulk email
Down
- 1. Copy of data for recovery
- 2. Simulated attack to find weaknesses
- 4. Ensuring systems are accessible
- 5. Ensuring data accuracy
- 8. Unauthorized access to data
- 11. Software that hides malware on a system
- 13. Scrambling data to make it unreadable
- 14. Programs that run on a computer
- 16. Software that secretly monitors user activity
- 18. Keeping information secret
- 19. Protecting systems and data
- 20. Secret word for access
- 24. Protecting personal information
- 26. Measures to prevent attacks
- 27. Network of infected computers
- 29. Network security system controlling traffic
- 30. Safeguard from harm
- 33. Malicious software designed to harm systems
- 35. Potential for loss or damage
