My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crucigrama Sopa de Letras Hoja de Trabajo
Calificar este Puzzle:
Log in or sign up to rate this puzzle.

Cyber Crossword

Horizontales
The mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide. In other words, convert the cipher text to plaintext without knowing the key.
A term to describe connecting multiple separate networks together.
A generic term for a number of different types of malicious code.
The state of being protected against the criminal or unauthorized use of electronic data.
A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.
A cryptographic algorithm for encryption and decryption
is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.
A threat action that undesirably alters system operation by adversely modifying system functions or data
is the process of transforming an encrypted message into its original plaintext.
is the need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.
Verticales
is the process of confirming the correctness of the claimed identity.
Protecting sensitive data
use physical characteristics of the users to determine access.
is the validity and conformance of the original information
MAC
is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. Generally, a compromised machine is only one of many in a botnet, and will be used to perform malicious tasks of one sort or another under remote direction.
In conjunction with #6 creates a term that refers to an attack to where a thumb drive or CD is left somewhere in hopes that a victim will insert it to their PC, thus causing an infection.
Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from being known or used.
A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.