Introduction to Cyber Security

1234567891011121314151617181920
Across
  1. 4. A sort of cyber assault in which attackers use fraudulent emails or websites to dupe people into disclosing sensitive information, such as login passwords.
  2. 5. A component of a computer system that prevents unauthorized data access.
  3. 6. a system for establishing a secure connection between a computing equipment and a computer network, or between two networks, through the use of an unsecured communication medium like as the public Internet.
  4. 8. A software update or repair published by developers to correct security flaws or enhance system performance.
  5. 12. When a person is tormented and harassed as a result of technological technologies like texting and social media platforms
  6. 15. unwanted email messages
  7. 16. Computer program that is used to provide customized adverts
  8. 19. a field in which computers and networks are employed
  9. 20. An authentication mechanism that requires users to produce two pieces of identity in order to get access to an account or system.
Down
  1. 1. To imitate a character, users exploit internet platforms to acquire access or personal information.
  2. 2. Manipulation used to obtain unauthorized access to a computer system
  3. 3. software that is secretly installed on a user's device in order to acquire confidential information
  4. 7. a breach of security in which sensitive, protected, or confidential material is copied, transferred, viewed, stolen, altered, or utilized by someone who is not allowed to do so.
  5. 9. A program can run entirely via the network without requiring any software to be installed on the endpoint device that is running it.
  6. 10. An unauthorized effort to gain access to a computer
  7. 11. Malware that prevents an organization from accessing a file system.
  8. 13. avoiding an organization's existing security mechanisms
  9. 14. software used with the goal of destroying, disrupting, or gaining unauthorized access to a computer
  10. 17. The process of protecting digital information over its full life cycle.
  11. 18. A collection of personal computers used to infect malicious software.