Week 1: Intro to Cybersecurity

1234567
Across
  1. 2. A term for information
  2. 4. This general term for security practices relating to computers
  3. 6. A style of attack that is used to gather data, information, or other knowledge to gain unwarranted access
  4. 7. This tool allows an individual to identify themselves as a specific person, granting them access to systems particular to them
Down
  1. 1. This complex string of characters is used to log-in to a device, service, or other secure
  2. 3. A term relating to an outside entity that in some way supports an organization (e.g. Workday is a third-party for JMS)
  3. 5. A recent technological development, where a machine can "think" and/or "learn" based off the information you provide.