Cybersecurity 1
Across
- 3. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 7. A weakness or flaw in a system that can be exploited by attackers.
- 8. The process of converting data into a code to prevent unauthorized access.
Down
- 1. The process of verifying the identity of a user or system.
- 2. A barrier that monitors and controls incoming and outgoing network traffic.
- 4. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- 5. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
- 6. A secret combination of characters used to authenticate users and protect accounts.