Cybersecurity
Across
- 5. A harmful program that damages computers or steals information.
- 7. Rules that guide how computers communicate securely.
- 8. A system that spots unauthorized access to a network.
- 9. A way to verify if someone is who they claim to be.
Down
- 1. When sensitive information is accessed without permission.
- 2. A barrier that protects a computer from harmful connections.
- 3. A weakness in a system that can be exploited by hackers.
- 4. A process that scrambles data to keep it secure.
- 6. An attempt to harm a computer system or steal data.
- 7. A scam where fake emails trick people into giving personal information.