Cyber Security
Across
- 1. A secret word or phrase used for authentication.
- 5. The practice of hiding the true identity of network communications.
- 7. A program that identifies and blocks unauthorized access.
- 8. A unique identifier assigned to a network device.
- 12. A technique used to deceive individuals into revealing sensitive information.
- 14. The process of converting information into a secret code.
- 15. A method of verifying the identity of a user.
Down
- 2. Unwanted, unsolicited email.
- 3. A malicious software that can encrypt files and demand ransom.
- 4. Online behavior that aims to harm, intimidate, or harass others.
- 6. The protection of sensitive information from unauthorized access.
- 9. Software designed to detect, prevent, and remove malicious programs.
- 10. A digital signature used to verify the authenticity of a message or document.
- 11. A technique used to exploit vulnerabilities in software or systems.
- 13. The act of gaining unauthorized access to computer systems.