CyberSmart '24

12345678910111213
Across
  1. 4. A form of software that protects against malicious software
  2. 6. A secret word or phrase used for authentication
  3. 8. A weakness that can be exploited in a system
  4. 10. The process of encoding data to prevent unauthorized access
  5. 12. Unwanted and unsolicited emails
  6. 13. Unauthorized access to or manipulation of data or systems
Down
  1. 1. A method of securing data during transmission across networks
  2. 2. A program designed to damage or disrupt a computer system
  3. 3. Prevents unauthorized access to data or systems
  4. 5. in the Middle An attack where the attacker intercepts communication between two parties
  5. 7. The act of verifying the identity of a user or device
  6. 9. A security technique using scrambled text, readable only with a key
  7. 11. A method to authenticate users with something they know