Cyber-security terms
Across
- 5. Detects computer viruses.
- 6. Trial and error hacking method to crack passwords, encryption keys, and any sensitive information.
- 8. Proving the identity of the user is correct.
- 10. Virus that infects multiple computers simultaneously.
- 12. Tricks such as fake emails, phone calls, and text messages used by attackers to get sensitive information.
- 16. Hackers use to spy on your computer activities.
- 17. Attackers that can evade security systems using a secret entryway.
- 18. Locks's your files and demands for a payment to unlock it.
- 19. Online computing vs physical hardware.
Down
- 1. Learning algorithms that are made to complete a goal.
- 2. Manages who's able to access data.
- 3. Misleading link disguised as something else.
- 4. Software designed to harms computer systems.
- 7. Lost or stolen information from a system.
- 9. A key that only authorized parties can access data to the original format.
- 10. Chain of blocks that holds data, linked together by strong locks.
- 11. Network security made to control, filter, and monitor network traffic.
- 13. Labels assigned to devices that are connected to the internet.
- 14. Unwanted installed ads or pop-ups on your computer.
- 15. Server attack that causes extreme lag.