CyberSecurity 1
Across
- 1. A type of attack where a hacker overloads a server with traffic to make it crash.
- 4. A type of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- 5. A method of encoding data to protect its confidentiality.
- 7. A security method that requires two forms of identification, such as a password and a fingerprint.
- 8. A commonly used firewall bypass technique that hides the source IP address.
Down
- 2. The practice of defending systems and networks from digital attacks.
- 3. A system that detects and prevents unauthorized access to computer networks.
- 6. The act of impersonating a legitimate entity to steal sensitive information.