Information Security - Crossword

123456789101112131415
Across
  1. 1. A security protocol that provides secure communication over a network, often used for remote access
  2. 3. A type of authentication that verifies a user's identity based on physical characteristics
  3. 7. A security measure that restricts access based on the principle of least privilege
  4. 9. A cryptographic key that is kept secret and used for decrypting data
  5. 12. A protocol used to secure email communication
  6. 13. A program or device that identifies and authenticates a user's identity electronically
  7. 14. An attack that involves intercepting and altering communication between two parties
  8. 15. A method of encrypting data that uses a single key for both encryption and decryption
Down
  1. 2. The act of tricking individuals into revealing sensitive information
  2. 4. A type of attack that uses social engineering to manipulate individuals into taking specific actions
  3. 5. A type of malware that hides its presence and can perform malicious actions without user knowledge
  4. 6. A type of attack that floods a system with excessive traffic to disrupt normal operation
  5. 8. A security incident response plan to restore systems and operations after an attack
  6. 10. A technique used to ensure data integrity by creating a unique hash value for a file
  7. 11. Software used to detect and prevent unauthorized access to a computer network