Cyber Threats & Security
Across
- 4. Deceptive attack tricking users into revealing sensitive information.
- 6. Malware disguised as legitimate software to trick users.
- 7. Extra security layer requiring two authentication factors.
- 11. Software that detects and removes malicious programs.
- 13. Security method using physical traits like fingerprints or facial recognition.
- 14. System that filters and blocks unauthorized network traffic.
Down
- 1. Capturing data while it is being transmitted over a network.
- 2. Overloading a server with excessive traffic to disrupt service.
- 3. Repeatedly guessing passwords to gain unauthorized access.
- 4. Redirecting users to fake websites to steal personal data.
- 5. Manipulating people into giving away confidential information
- 8. Restricting system access based on user roles.
- 9. An intermediary server between users and websites for security and privacy.
- 10. Secret string of characters used for authentication.
- 12. Malware that secretly collects user information without consent.(Social Engineering) Manipulating people into giving away confidential information.