Across
- 1. intentionally taking over the administrative position
- 5. An observable occurrence in an information system or network.
- 10. A program used for, and writing html and css documents
- 12. Malicious program data which can damage software
- 14. An unusual message from an unknown source, with malicious intent behind it.
- 15. A kind of.. "Warden" that protects personal information, frequently found in websites with personal information.
- 16. Unauthorized program code dedicated to carrying out a malicious commands, changes, etc.
- 17. A value computed with a cryptographic process using a private key and then appended to a data object
- 18. The activities that refer to the short and long term development of a cyber-incident
- 19. The manner/method someone uses to infiltrate a secure system
Down
- 2. refers to anything that could seriously affect a given system, infrastructure, or data center
- 3. An ethical hacking method used to gather unfamiliar system data
- 4. The result of unintentionally or accidentally deleting data
- 6. a method used to infiltrate unauthorized systems in violation of security policy
- 7. A property that information is not disclosed to users, processes, or devices unless they have been authorized to access the information
- 8. A chain of text used to make calculations in Excel
- 9. contains information, text, and can be used to write specific mathematical equasions
- 11. A type of cyber-attack that is automized for this specific type of e-attack
- 13. Things like firewalls, services, password prompts, etc.
