Unit 1: Cybersecurity

123456789101112131415161718192021222324252627282930313233343536373839404142
Across
  1. 3. Laws in Europe that regulate how companies can collect personal data
  2. 6. Flaw or weakness in a system or device
  3. 8. Type of authentication that requires 2 ways to identify a user
  4. 9. Type of data that stores users medical records
  5. 11. General term used to describe an individual or a group of hackers
  6. 12. Process of measuring what is happening within the system
  7. 13. The ability to find information, evaluate information credibility, and use information effectively
  8. 14. Software that prevents users from accessing their files or network until a ransom is paid.
  9. 16. Type of data that stores users bank account and credit card numbers
  10. 18. Videos, images, or audio recordings that have been convincingly altered using artificial intelligence
  11. 20. The science of making machines that can "think" and “create” like humans.
  12. 22. Type of software that is designed to intentionally harm or damage a computer or network.
  13. 23. The assurance that systems and data are accessible by authorized users when and where needed
  14. 25. The protection of information from people who are not authorized to view it
  15. 28. Software that secretly gathers information about a person or organization and sends it to an attacker
  16. 29. Type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
  17. 31. Cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company
  18. 33. Authentication that uses an individual’s physical characteristics to verify their identity
  19. 34. Ensures that one cannot deny having sent or received a message
  20. 37. Type of data that store a users fingerprint or facial recognition
  21. 38. Potential for a cybercriminal to exploit a vulnerability
  22. 39. Specific group of hackers who are motivated by their ideological views.
  23. 40. A long password be made of a sentence or a series of words
  24. 41. The information about a particular person that exists on the Internet as a result of their online activity
  25. 42. Software that make it easy to have strong, unique passwords for all of your accounts
Down
  1. 1. AI algorithms can help flag anomalies in data
  2. 2. Current or former employees who seek revenge on a company by abusing their access to files and passwords
  3. 4. Any information that can be used to identify an individual (aka Personal Data)
  4. 5. Network security device that monitors and filters incoming and outgoing network traffic.
  5. 7. Systems that suggest the next video or song based on your patterns and the patterns of other similar consumers
  6. 10. Process of enforcing policies and user privileges
  7. 15. Aims at ensuring that information is protected from unauthorized or unintentional alteration
  8. 17. External mechanism of control. Rules set in place by someone else.
  9. 19. Hackers that are sponsored by a country.
  10. 21. Group of hackers with ideological views but act with the intent to harm, typically resulting in violence
  11. 24. Potential for loss when an attack happens
  12. 26. Hackers that attack computers for the fun and challenge of it all
  13. 27. Legal document outlining how a company can collect and use your data
  14. 30. Process of identifying a user and granting them access
  15. 32. Laws in California that protect consumers and regulates companies that collect and sell data
  16. 35. Network of physical devices embedded with electronics which enables things to connect and exchange data
  17. 36. Internal system of controls. Knowing the difference between right and wrong.