Cybersecurity
Across
- 2. Network of private computers infected with malicious software
- 4. Technique of making data unreadable to unauthorized users
- 6. Fraudulent attempt to obtain sensitive information
- 7. Barrier between a trusted network and untrusted networks
- 9. Software designed to damage, disrupt, or gain unauthorized access
- 10. Secret string used to authenticate access
Down
- 1. Attacker tricks someone into breaking security procedures
- 3. Attempts to guess a password by trying many combinations
- 5. Method of verifying identity using fingerprints, retina, etc.
- 8. Security flaw allowing attackers to access restricted data