M3
Across
- 3. Physical or virtual barrier that controls network traffic
- 5. Process of verifying a user's identity
- 9. Security weakness in a system
- 10. A malicious program that replicates itself and spreads to other computers
- 13. Required information to solve a problem
- 14. Process of gathering necessary information about a problem
- 16. Unwanted bulk messages
- 19. Steps taken to prevent attacks
- 20. Testing a solution's effectiveness
- 21. Device for accessing computer networks
Down
- 1. Community-wide computer network
- 2. Malicious software
- 4. To find and fix problems
- 6. Physical components of a computer system
- 7. Final step in problem-solving process
- 8. The practice of protecting systems, networks, and programs from digital attacks
- 11. Make data unreadable to unauthorized users
- 12. A type of social engineering attack using fake emails
- 15. Tools used to detect and remove malware
- 17. Security copy of data
- 18. A common first step in problem-solving