Cyber security
Across
- 3. verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
- 6. facts provided or learned about something or someone.
- 8. malware that replicates and transfers itself to other computers via a network
Down
- 1. The authorization given to users that enables them to access specific resources on the network,
- 2. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
- 4. someone who hacks into your account
- 5. information that has been translated into a form that is efficient for movement or processing
- 7. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.