Cyber Marathon
Across
- 1. A set of rules and configurations that control network traffic to enhance security
- 3. A technique to disguise a message or data to make it unreadable without the proper decryption key
- 5. A program designed to infect and spread across computer systems
- 6. The practice of tricking individuals into revealing sensitive information through deceptive emails
- 7. A unique string of characters that verifies a user's identity, often used for two-factor authentication
Down
- 2. A type of malware that encrypts a user's files and demands a ransom for their release
- 4. The process of guessing passwords to gain unauthorized access