cybersecurity axel
Across
- 1. – A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
- 9. – The process of confirming that someone or something is genuine.
- 11. – Software designed to harm or exploit any device, service, or network.
- 12. - Protocol similar to arp , but for IPv6
- 13. – A secret word or phrase used to verify a user’s identity.
Down
- 2. - Type of malware that secretly gathers information from an infected computer.
- 3. - Code that assigns a numerical value to basic English letters, characters, and symbols
- 4. - Used to perform distributed denial-of-service (DDoS) attacks.
- 5. - Secret method of bypassing normal authentication or security controls.
- 6. - A standalone malware that replicates itself in order to spread to other computers.
- 7. - A group of communicating computers and peripherals known as hosts
- 8. – An attempt to damage, steal, or disrupt digital systems or networks.
- 10. – The process of converting data into a code to prevent unauthorized access