Your Path to Security

12345678910111213
Across
  1. 4. A string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization
  2. 6. A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself
  3. 9. A compromised computer connected to the internet that performs malicious activities
  4. 10. Unauthorized user who attempts to or gains access to an information system
  5. 13. The fraudulent practice of sending text messages purporting to be from reputable companies in order to induce individuals to reveal personal information
Down
  1. 1. a general category of services related to cloud computing and remote access
  2. 2. A circumstance or event that has or indicates the potential to exploit vulnerabilities
  3. 3. Distributed Denial-of-Service
  4. 5. An attempt to gain unauthorized access
  5. 7. Software that compromises the operation of a system
  6. 8. the fabrication of a false online identity by a cybercriminal for the purposes of deception
  7. 11. The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence
  8. 12. A computer program that can replicate itself, infect a computer without permission or knowledge of the user