cyber security
Across
- 2. A type of malware that disguises itself as legitimate software
- 5. Maintaining the accuracy and trustworthiness of data
- 7. The act of tricking people into revealing sensitive information
- 8. A security process requiring a username and password
- 10. A method used to convert readable data into unreadable code
- 11. A type of malware that demands payment to restore access to files
- 12. Malicious software that replicates itself to spread to other computers
- 14. Ensuring that data and services are accessible when needed
- 15. A type of cyber attack that overwhelms a server with traffic
Down
- 1. The practice of ensuring data is only accessed by authorized users
- 3. A process that transforms plaintext into unreadable text
- 4. A program designed to protect your device from viruses
- 6. A network security system that monitors and controls incoming and outgoing traffic
- 7. A secret code used for authentication
- 9. Unsolicited and unwanted bulk emails
- 13. A person who gains unauthorized access to a system