Foundations of Cybersecurity
Across
- 5. This device inspects and filters network traffic
- 6. the process of converting data into a code
- 8. the process of verifying an identity before granting access
- 9. the process of encoding information so that only the person that the message was intended for can read it
Down
- 1. the practice of sending fake emails
- 2. a network of compromised computers that are controlled by a single attacker
- 3. a weakness within a computer system
- 4. software that is designed to disrupt or damage access to a computer
- 7. a type of malicious software that secretly gathers a user's personal data
- 10. a type of malware that encrypts a victim's files or locks their device, and then demands payment