CyberSmart '24
Across
- 4. A form of software that protects against malicious software
- 6. A secret word or phrase used for authentication
- 8. A weakness that can be exploited in a system
- 10. The process of encoding data to prevent unauthorized access
- 12. Unwanted and unsolicited emails
- 13. Unauthorized access to or manipulation of data or systems
Down
- 1. A method of securing data during transmission across networks
- 2. A program designed to damage or disrupt a computer system
- 3. Prevents unauthorized access to data or systems
- 5. in the Middle An attack where the attacker intercepts communication between two parties
- 7. The act of verifying the identity of a user or device
- 9. A security technique using scrambled text, readable only with a key
- 11. A method to authenticate users with something they know