My Crossword Maker Logo
Powered by BrightSprout
Save Status:
or to save your progress. The page will not refresh.
Controls:
SPACEBAR SWITCHES TYPING DIRECTION
Answer Key:
Edit a Copy:
Make Your Own:
Crossword Word Search Worksheet
Rate This Puzzle:
Log in or sign up to rate this puzzle.

Threats to Data

Use 4.3 facts sections & the Internet to complete. It's due today. There will be a 10% deduction for each day late. Some words use hypens.
Across
Maintaining and assuring the accuracy and completeness of data over its entire lifecycle.
Keeping of another person or entity's information private.
An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
Tricking a victim into revealing sensitive information under false pretenses.
Attempting to secretively discover private information about a person, company, or other entity.
Down
An attempt to connect to a server by capturing and resending authentication information.
The use of deception to gain personal and/or private information for unlawful purposes.
Can occur can occur for a number of different reasons, such as power surges and spikes, overheating, and dust accumulation.
Exploiting a victim from within their browser.
Authorized users that can access the systems needed to perform their daily tasks.
Can occur when a computer system loses power abruptly.
Can occur as the result of short periods of hardware or software failure.
Can occur for malicious or accidental reasons and result in the harm computer components and/or data being lost.
A technique used to retrieve information that could be used to carry out an attack on a computer network.
A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.