Across
- 7. when a person tags along with another person who is authorized to gain entry into restricted areas.
- 8. The process of taking plain text and scrambling it into an unreadable format.
- 10. Should be constructed of upper and lower case letters, numbers, and special characters.
- 11. The "I" in the CIA Triad. Protection from unauthorized changes.
- 13. The process or action of verifying the identity of a user or process.
- 14. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drives.
- 16. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- 17. A flaw or weakness in a computer system that could be exploited to violate the systems security.
Down
- 1. Facebook, Twitter, Instagram, etc. (two words)
- 2. Harmful computer programs such as viruses, worms, and trojans used by hackers to gain access to your computer and cause destruction.
- 3. Security tool that creates a secure, encrypted connection between you and the Internet (acronym).
- 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 5. The address of a webpage.
- 6. The "C" in the CIA Triad. Protection of information from unauthorized access.
- 7. A fraudulent email purportedly from a reputable company attempting to get personal information.
- 9. The "A" in the CIA Triad. It ensures authorized users have access.
- 12. A sequence of words or text used to control access to a computer; similar to a password.
- 15. the automated recognition of individuals by means of unique physical characteristics, typically for the purpose of security.
