Vocabulary

12345678910111213
Across
  1. 3. The unauthorized use or exploitation of an existing connection or system to gain access to another system or network.
  2. 5. A malicious program that can replicate itself and spread to other computers, often causing damage to files and systems.
  3. 8. A security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between a private network and external networks.
  4. 10. To take advantage of a vulnerability or weakness in a computer system for malicious purposes.
  5. 11. The process of converting information into code to prevent unauthorized access, ensuring secure transmission and storage of sensitive data.
  6. 13. A list of approved entities, such as software applications or IP addresses, allowed to access a particular system or network.
Down
  1. 1. A person who exploits computer hardware and software, either for malicious purposes or ethical ones.
  2. 2. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
  3. 4. Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, and ransomware.
  4. 6. A technique where a person or program masquerades as someone or something else to deceive or gain an advantage, often used in phishing attacks.
  5. 7. A hidden method for bypassing normal authentication or encryption to access a computer system, often used by hackers.
  6. 9. Unauthorized access or entry into a computer system or network by an individual or software.
  7. 12. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication.