Cybersecurity
Across
- 5. A potential cause of harm to a system, such as an attacker or malicious software
- 7. The process of verifying the identity of a user or system
- 8. A small piece of data used to verify a user’s identity during authentication
- 9. Writing software with built-in security measures to prevent vulnerabilities
- 10. A weakness in a system that can be exploited by attackers
Down
- 1. Process of converting data into a code to prevent unauthorized access
- 2. A piece of software designed to fix vulnerabilities or improve functionality
- 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
- 4. A method of attempting to acquire sensitive information by pretending to be a trustworthy entity
- 6. A system designed to prevent unauthorized access to or from a private network