Across
- 2. A type of computer program that infects computer systems by replicaton, often inserting its own code to modify the expected behavior of the program.
- 4. The act of sending victims deceptive emails that are designed to trick people into divulging sensitive informaiton, typciall via a malicious hyperlink.
- 6. ________ software, such as viruses, malware, or ransomeware, is designed or intended to do the most harm when executed on a computer system.
- 7. The process of encoding data, a message, or the securing of information in transit between authorized parties or end-points.
Down
- 1. The result of a compromise to the security or data of an information system or network.
- 3. Malware planted on a computer system that encrypts the data and requires a ransom to be paid in order to unlock access to the data or computer system.
- 5. Cyber_____ is the prevention of damage to or the protection of computer and information systems. It is everyone's responsibility!
- 8. The probability of negative exposure or loss resulting from a cyber attack or data breach on your network.