NCSAM 2024

123456789101112131415161718192021
Across
  1. 2. Ensuring timely and reliable access to information.
  2. 5. the state of keeping or being kept secret or private.
  3. 7. an attack that holds data hostage via the use of encryption
  4. 8. Software or Operat updates that address bugs or vulnerabilities within a program or product.
  5. 11. The most commonly used wireless communication technology - you might be using it right now.
  6. 13. the state or condition of being free from being observed or disturbed by other people.
  7. 14. Shorter term for malicious software
  8. 15. internal data being made accessible to external entities without authorization.
  9. 18. the use of deception to manipulate individuals into divulging confidential information to be used for fraudulent purposes. (two words, no space)
  10. 19. An exploit not known until it has been used (two words, no space)
  11. 20. The application of mathematical processes on data-at-rest and data-in-transit to provide the security benefits of confidentiality, authentication, integrity and non-repudiation.
  12. 21. wrongful or criminal deception intended to result in financial or personal gain.
Down
  1. 1. A link between networks that is typically encrypted to provide a secure, isolated, private path of communication. (You might be using this right now)
  2. 3. a potential exploitable weakness in a system
  3. 4. ensuring data is complete, trustworthy, and has not been modified or accidentally altered
  4. 6. A security tool, which may be a hardware or software solution that is used to filter network traffic.
  5. 9. The process of identifying, assessing, and prioritizing risks (two words, no space)
  6. 10. a social engineering attack that attempts to gather information about victims
  7. 12. A malicious program that can spread without user interaction
  8. 16. A malicious program that is typically designed to damage or destroy data.
  9. 17. Software that secretly records your keyboard input