Security
Across
- 3. Process of verifying the identity of a user
- 4. Unauthorized access to data or systems
- 5. A secret code used for authentication
- 9. Technique of hiding data within another file
- 10. Defense system that monitors and controls incoming and outgoing network traffic
- 12. Digital mark that ensures the integrity of a document
Down
- 1. Malicious software that spreads and damages computer systems
- 2. A technique to deceive attackers by providing false information
- 6. Practice of protecting sensitive information by destroying it
- 7. Deliberately tricking someone into revealing confidential information
- 8. Person responsible for identifying and fixing security vulnerabilities
- 9. Protection against unauthorized access
- 11. Process of converting readable data into unreadable format