crack the code
Across
- 3. A method of cyber attack that involves sending emails with malicious attachments or links (8 letters)
- 6. A program designed to prevent, detect, and remove malware (10 letters)
- 7. Testing The process of identifying and fixing security vulnerabilities in a computer system (10 letters) Penetration Testing
- 9. A technique used to secure wireless networks (11 letters)
- 10. Protects a computer system from unauthorized access (9 letters)
Down
- 1. A type of cyber attack that floods a network with traffic to make it unavailable to users (3 letters)
- 2. Authentication A security measure that verifies the authenticity of a user attempting to log in (14 letters)
- 4. Detection A security measure that tracks and analyzes network traffic to detect and prevent unauthorized access (9 letters)
- 5. A method of protecting sensitive data by converting it into a code that can only be deciphered with a key (9 letters)
- 8. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)