Unit 1 Concepts - Intro to Cyber

1234567891011121314151617181920
Across
  1. 6. A type of malware that locks files until a ransom is paid
  2. 9. An attack that floods a system with traffic to make it unavailable
  3. 11. A scam where attackers impersonate a trusted entity to steal sensitive information
  4. 13. Verifying the identity of a user or system
  5. 14. A security system that monitors and controls network traffic
  6. 17. A security process requiring two forms of verification to access an account
  7. 19. A tool to store and generate secure passwords
  8. 20. Software that secretly gathers user information without consent
Down
  1. 1. An incident where data is altered without authorization
  2. 2. A key used in encryption to secure communications that can be shared openly
  3. 3. The process of converting information into a secure format to prevent unauthorized access
  4. 4. Ensuring information is not accessed by unauthorized parties
  5. 5. Practices designed to protect computers, networks, and data from attacks
  6. 7. Ensuring information remains accurate and trustworthy
  7. 8. Ensuring authorized users have access to information when needed
  8. 10. Manipulating people to give up confidential information
  9. 12. Harassment or bullying that occurs through digital platforms
  10. 15. Malicious software designed to harm or exploit computers
  11. 16. An incident where sensitive data is accessed without authorization
  12. 18. A key used in encryption that must remain confidential