cybersecurity
Across
- 3. worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
- 5. Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
- 8. A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
- 9. A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
- 10. of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
- 1. exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
- 2. force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
- 4. The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
- 6. A security protocol used to encrypt internet traffic (4 letters): ______
- 7. A type of authentication that uses physical characteristics, such as fingerprints or facial