Cybersecurity

12345678910
Across
  1. 5. A potential cause of harm to a system, such as an attacker or malicious software
  2. 7. The process of verifying the identity of a user or system
  3. 8. A small piece of data used to verify a user’s identity during authentication
  4. 9. Writing software with built-in security measures to prevent vulnerabilities
  5. 10. A weakness in a system that can be exploited by attackers
Down
  1. 1. Process of converting data into a code to prevent unauthorized access
  2. 2. A piece of software designed to fix vulnerabilities or improve functionality
  3. 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
  4. 4. A method of attempting to acquire sensitive information by pretending to be a trustworthy entity
  5. 6. A system designed to prevent unauthorized access to or from a private network