Information Security
Across
- 1. A program that appears legitimate but actually contains malicious code
- 4. The process of identifying and fixing security vulnerabilities.
- 5. A malicious software that encrypts data and demands a ransom
- 6. A technique for verifying the identity of users or devices
Down
- 2. The act of browsing the internet without revealing your identity.
- 3. Unauthorized access to computer systems or data
- 4. A unique combination of characters used to access a system