Introduction to Cybersecurity

12345678910
Across
  1. 4. Fraudulent attempt to steal sensitive data via deceptive emails.
  2. 6. Incident where data is accessed/stolen without permission.
  3. 9. Three core security goals: Confidentiality, Integrity, and _______.
  4. 10. Moral principles governing digital behavior (e.g., privacy, transparency).
Down
  1. 1. Security system that monitors/controls network traffic (blocks unauthorized access).
  2. 2. Self-replicating malware that spreads between devices.
  3. 3. Process of encoding data to prevent unauthorized reading.
  4. 5. Malicious software designed to damage systems (e.g., viruses, trojans).
  5. 7. Person who exploits system vulnerabilities.
  6. 8. Software update to fix security flaws.