cybersecurity
Across
- 1. What do you call the set of secret characters used to access accounts and secure information?
- 5. What is malicious software that disguises itself as legitimate software?
- 6. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
- 7. What is a deceptive email that tricks users into giving sensitive information?
- 10. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
- 2. What is the process of verifying the identity of a user before granting access to a system?
- 3. What type of attack overwhelms a system with traffic, causing it to crash?
- 4. What do you call a software program that replicates itself and spreads to other computers?
- 8. What is the act of attempting to gain unauthorized access to a computer or network?
- 9. What is a tool that filters incoming and outgoing network traffic to secure a network?