Across
- 2. being permitted to use one's own equipment rather than being forced to utilize one given by the government
- 5. the process of studying information systems in order to learn about their hidden features.
- 6. a fraudulent behavior in which a person establishes a fictitious persona or phony identity on a social networking service, generally with the intention of luring a specific victim in.
- 7. providing credit or acknowledgement of their effort to the creator of the original work
- 8. a single attacking party that has control over a network of machines infected with malware.
Down
- 1. one of the most basic and well-known encryption methods
- 2. a cyber assault in which sensitive, confidential, or otherwise protected material has been accessed and/or disclosed without permission.
- 3. a harmful method of persuading a user to click on something other than what the user expects
- 4. ____ is the result of encryption performed on plaintext using an algorithm, called a cipher.
- 5. These three letters represent the three Cs: confidentiality, integrity, and availability.
