InfoSec Crossword Puzzle

123456789101112
Across
  1. 4. The process of confirming the correctness of the claimed identity.
  2. 6. A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage.
  3. 7. A technology that allows us to access our files and/or services through the internet from anywhere in the world.
  4. 8. A malicious application or script that can be used to take advantage of a computer’s vulnerability.
  5. 9. A set of programs that tell a computer to perform a task.
  6. 11. A technique used by hackers to obtain sensitive information.
  7. 12. The most widely-installed LAN technology.
Down
  1. 1. A type of malware that functions by spying on user activity without their knowledge.
  2. 2. A term to describe connecting multiple separate networks together.
  3. 3. the process of transforming an encrypted message into its original plaintext.
  4. 5. A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.
  5. 6. Another kind of malware that allows cybercriminals to remotely control your computer.
  6. 10. The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system.