Cyber Security Awareness Month
Across
- 3. A network security device that monitors and filters incoming and outgoing network traffic to block unauthorized access.
- 5. The process of converting data into a code to prevent unauthorized access and protect data confidentiality.
- 7. A secret combination of characters used to authenticate and gain access to a computer system or online account.
Down
- 1. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity.
- 2. A weakness or flaw in a system's security that can be exploited by attackers to gain unauthorized access.
- 4. Software designed to detect, prevent, and remove malicious software (malware) from a computer or network.
- 6. A broad term for any software designed to harm, exploit, or infiltrate computer systems, including viruses, spyware, and ransomware.