OA ISM SECURITY CROSSWORD

12345678910111213141516
Across
  1. 3. A person who attempts to gain unauthorized access to computer systems.
  2. 4. The quality of data being accurate, consistent, and unaltered.
  3. 5. The process of converting data into a code to prevent unauthorized access.
  4. 8. A piece of code capable of self-replicating and causing damage to a computer system.
  5. 11. Faking the source of data to appear as if it's coming from a trusted source.
  6. 12. The state of keeping information private and only accessible to authorized parties.
  7. 13. A network security device that monitors and controls incoming and outgoing traffic.
  8. 16. Ensuring that computer systems and data are accessible when needed.
Down
  1. 1. Software intended to harm or exploit computer systems and data.
  2. 2. Measures taken to secure computer systems from threats and vulnerabilities.
  3. 6. A type of cyber attack where fraudulent emails are used to deceive individuals into revealing sensitive information.
  4. 7. (Virtual Private Network): A technology that provides secure and private connections over public networks.
  5. 9. Malicious software that encrypts a user's data and demands payment to restore access.
  6. 10. Software that collects information from a computer or network without the user's knowledge.
  7. 11. Engineering: Manipulating individuals to divulge confidential information or perform actions unknowingly.
  8. 14. A secret combination of characters used to access a system or data.
  9. 15. The potential for loss or harm in the context of cybersecurity.