Security Crossword

123456789101112131415161718192021222324252627282930
Across
  1. 2. a physical device assigned to a user that can generate a unique code
  2. 4. security principle that ensures information is only modified in an authorized manner
  3. 6. security principle that ensures information is accessible by authorized users whenever required
  4. 7. the willful use of electronic technology to repeatedly threaten, abuse, or dominate others, often anonymously
  5. 8. security principle that ensures information is only disclosed or made available to authorized users
  6. 11. notification sent by an authentication server to a mobile device associated with a user
  7. 12. a case of unauthorized computer access
  8. 14. extra information that describes data, like location information or author information
  9. 17. the act of verifying or proving a user's claim to an identity
  10. 18. aspect of a computer that can be used to breach security
  11. 19. special codes used to decode data
  12. 20. the act of granting a user access to a system resource
  13. 23. emails fraudulently ask users to provide sensitive account information by posing as legitimate companies
  14. 27. achieved by submitting huge numbers of access requests simultaneously to one target website, causing that site's web server to be overloaded, thus preventing legitimate requests from being handled
  15. 28. a type of malware disguised as legitimate software such as a game or a utility application
  16. 30. measurements of the unique characteristics of an individual
Down
  1. 1. control which users, groups, or services can perform an action on a file
  2. 3. A standardized set of rules for formatting and processing data
  3. 5. is the act of a user claiming an identity
  4. 9. software or hardware that blocks unauthorized communication with a computer while allowing authorized communication over a network
  5. 10. any software developed to compromise the confidentiality, integrity, or availability of data
  6. 13. a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam
  7. 15. a phishing attack aimed at a high-value individual like a CEO
  8. 16. a threat actor who gains unauthorized access to a high-value target for an extended period of time
  9. 21. intelligence derived from publicly available information on an individual or organization
  10. 22. the process of adding geographical identification to a device
  11. 24. the most common form of a breach
  12. 25. an authentication method that uses only one authentication factor to verify a claimed identity
  13. 26. a protected environment where suspicious files can be run
  14. 29. software that provides protection against computer viruses and many other forms of malware