Cybersecurity
Across
- 3. A type of server that allows the access of data and programs over the Internet instead of your computer’s hard drive.
- 5. The amount of data that can pass through a network or part of a network per second.
- 9. Protects against code injection attacks and other malicious content on trusted web pages.
- 10. Malware that locks access to files and demands a ransom to release them.
- 11. Monitors and restricts the sharing of sensitive information to prevent data breaches.
- 12. Software that collects user data without consent and sends it to third parties.
- 13. Encodes data to keep it safe from unauthorized access.
- 14. Software that stops known malware. It’s crucial for catching viruses before they can cause trouble.
Down
- 1. Software designed to infect and damage a system or network, including viruses, worms, and trojans.
- 2. Malware disguised as harmless software to gain access to a system.
- 4. A specific type of cyberattack that exploits the fraudulent use of electronic communications to take advantage of users and collect personal information.
- 6. Ensures secure access to cloud apps and keeps an eye on unsanctioned activities.
- 7. Any unauthorized attempt to access, alter, steal, or block system or user information.
- 8. Acts as a barrier between the network and incoming/outgoing traffic, analyzing and managing web activities.