Cyber Security

123456789101112131415
Across
  1. 1. A secret word or phrase used for authentication.
  2. 5. The practice of hiding the true identity of network communications.
  3. 7. A program that identifies and blocks unauthorized access.
  4. 8. A unique identifier assigned to a network device.
  5. 12. A technique used to deceive individuals into revealing sensitive information.
  6. 14. The process of converting information into a secret code.
  7. 15. A method of verifying the identity of a user.
Down
  1. 2. Unwanted, unsolicited email.
  2. 3. A malicious software that can encrypt files and demand ransom.
  3. 4. Online behavior that aims to harm, intimidate, or harass others.
  4. 6. The protection of sensitive information from unauthorized access.
  5. 9. Software designed to detect, prevent, and remove malicious programs.
  6. 10. A digital signature used to verify the authenticity of a message or document.
  7. 11. A technique used to exploit vulnerabilities in software or systems.
  8. 13. The act of gaining unauthorized access to computer systems.