cybersecurity Kader
Across
- 2. A person who uses computers to gain unauthorized access to data
- 5. A network security device that monitors traffic and blocks unauthorized access
- 7. A software error or flaw that can be exploited by hackers
- 8. A temporary code or object used to verify your identity
Down
- 1. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an email.
- 3. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system
- 4. A type of malware that locks your files and demands payment to release them
- 6. The process of scrambling data so it becomes unreadable without a specific key