Cyber Security
Across
- 2. A part of the internet that isn't indexed by search engines
- 4. The conversion of information or data into a code
- 6. Fraudulent email that demands urgent action
- 8. A portmanteau of “malicious” and “software”
- 11. A type of malicious software
- 12. Virtual Private Network
- 14. The process of identifying a user’s identity
- 16. bypassing an organization's existing security systems
Down
- 1. The use of electronics to bully someone
- 3. The manipulation of facial appearance through deep generative methods.
- 5. A form of malware used by hackers to spy on you and your computer activities
- 7. a network security device that monitors and filters incoming and outgoing network traffic
- 9. Artificial intelligence
- 10. A means of attack on a computer system
- 13. he result of a hacker successfully breaking into a system,
- 15. A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
- 16. An error, fault in a computer system