Cybersecurity Terms
Across
- 2. Encoding data for security reasons
- 4. Harmful software that damages computers
- 5. Unauthorized access to data
- 9. Falsifying identity or source
- 10. Software that monitors for malware
- 11. Algorithm for encrypting data
- 12. Network entry point for traffic
- 16. Access granted to perform actions
- 17. Ethical hacking to find vulnerabilities
- 19. Malware locks files for money
- 20. Network security barrier
Down
- 1. Facial recognition to grant access
- 3. Hidden entry for unauthorized access
- 6. List of blocked entities
- 7. Network of infected computers
- 8. Converting ciphertext into plaintext
- 13. Machine learning and thinking
- 14. Verifying user identity
- 15. Scam emails that trick users
- 18. Software displaying unwanted ads