Information Security
Across
- 3. A secret word or phrase that must be used to gain access to a system or service.
- 7. A technique that falsifies the identity or location of a sender or receiver.
- 8. A deliberate attempt to compromise or damage a system, network, or program.
- 11. The process of protecting data by secret code.
- 13. A cybercriminal who breaks into systems
- 14. A part of the internet that is hidden from regular search engines and requires special software to access.
- 15. A software program that enters a computer system without the owner’s knowledge or consent.
Down
- 1. The practice of protecting systems, networks, and programs from digital attacks.
- 2. A type of malware that infects and replicates itself on other files or programs
- 4. A small computer defect that causes errors or failures.
- 5. A small piece of data stored on a user’s browser that tracks their preferences or activities.
- 6. A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
- 9. A type of malware that encrypts the victim’s data and demands payment for its decryption.
- 10. Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
- 12. A system that prevents unauthorized access to a network or device.