Across
- 4. An unimplemented method or algorithm that is able to take advantage of a vulnerability in a computer system
- 5. A person gaining unauthorized access to computer networks, systems, or data who breaks into computer systems
- 6. An attack on a Bluetooth enabled device (usually a mobile phone) in which an attacker sends an unauthorized message to the device
- 11. A person who targets computer systems or websites with the motivation of making ideological, political, or religious statements
- 13. All malicious software, including viruses, Trojan horses, and worms
- 15. Listening in to information that is transmitted over the air including verbal conversations with an objective of learning private information
- 16. A weakness in some aspect of a computer system that can be used to compromise a system during an attack
- 17. Measure of potential consequences if the computer system or the confidentiality of information was compromised as the result of a security breach
- 20. Property of being accessible and usable on demand by an authorized entity
- 21. Malicious software that observes user's information (passwords, etc.) and actions and then sends that information to a cybercriminal
- 24. Property of accuracy and completeness
- 26. The suppression or prohibition of any parts of books, films, news, etc. that are considered obscene, politically unacceptable, or a threat to security
- 27. A string of characters that allows access to a computer, interface, or system.
Down
- 1. The fear of being without a mobile device, or beyond mobile phone contact
- 2. A specific type of over-sharing, which represents the habitual use of social media to share news, images, etc. of one’s children
- 3. A software that detects and cleans comp
- 7. Property that information is not made available or disclosed to unauthorized individuals, entities, or processes
- 8. A form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels
- 9. Potential cause of an unwanted incident, which can result in harm to a system or organization
- 10. The act of using the Internet, cell phones, video games, or other technology gadgets to send, text, or post images intended to hurt or embarrass another person.
- 12. A humorous or malicious deception
- 14. the ability to control information about oneself
- 18. Intentionally or unintentionally acquiring and using someone else’s ideas and opinions and presenting them as if one’s own without making a reference to or citing the source
- 19. Something designed to make readers want to click on a hyperlink especially when the link leads to content of dubious value or interest
- 22. An autonomous and malicious software program propagating among computer networks
- 23. The person that a software program or hardware device is designed for.
- 25. Anything that has value to the organization, its business operations and their continuity, including Information resources that support the organization's mission
- 28. Measure of the criticality of a situation--the likelihood of something being attacked