Cybersecurity

123456789
Across
  1. 2. A piece of software designed to fix security vulnerabilities or improve functionality.
  2. 4. The process of converting information into a code to prevent unauthorized access.
  3. 5. Software designed to harm or exploit computer systems and data.
  4. 9. Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
  1. 1. Network security device that monitors and controls incoming and outgoing network traffic.
  2. 3. Process of verifying the identity of a user, system, or application.
  3. 6. The practice of protecting systems, networks, and programs from digital attacks.
  4. 7. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
  5. 8. Malicious software that can replicate itself and spread to other computers.