Cybersecurity
Across
- 5. The highest level of access in a computer system
- 6. Security technology that uses physical characteristics like fingerprints or facial recognition
- 7. A security principle that ensures data has not been altered or tampered with
- 9. A security threat that originates from within an organization
- 10. The process of confirming the identity of a user or device
Down
- 1. A hidden method of bypassing normal authentication to gain access to a system
- 2. the science of encrypting and decrypting data
- 3. is a key goal of cyber security
- 4. The use of investigative techniques to examine digital crimes or security breaches
- 8. one of the world's largest ransomware attacks in history