Network Security & Protection
Across
- 4. Unique mark indicating authenticity or approval.
- 6. Assurance that a party cannot deny their actions.
- 8. Temporary credential for secure access.
- 10. Reverting encrypted data back to its original form.
- 11. Verifying user identity or access rights.
- 13. Malicious software that secretly monitors user activity.
- 14. Fraudulent attempts to obtain sensitive information online.
- 15. Analyzing patterns in user actions for security.
- 16. Converting data into a secure format.
- 18. Luring victims with false promises or goods.
- 19. Ensuring data remains accurate and unaltered.
- 20. Software designed to detect and eliminate malware.
- 21. Decentralized ledger technology for secure transactions.
Down
- 1. Encrypted data that is unreadable without decryption.
- 2. Readable data before encryption.
- 3. Identifying individuals or objects based on characteristics.
- 5. Secretly listening to private communications or data.
- 7. Software that displays unwanted advertisements on devices.
- 9. Unauthorized access to computer systems or networks.
- 12. Malware that encrypts files for ransom payment.
- 14. Secret word or phrase for user authentication.
- 15. Identifying individuals using biological traits.
- 17. Protecting personal information from unauthorized access.