Across
- 3. The unauthorized use or exploitation of an existing connection or system to gain access to another system or network.
- 5. A malicious program that can replicate itself and spread to other computers, often causing damage to files and systems.
- 8. A security system that monitors and controls incoming and outgoing network traffic, acting as a barrier between a private network and external networks.
- 10. To take advantage of a vulnerability or weakness in a computer system for malicious purposes.
- 11. The process of converting information into code to prevent unauthorized access, ensuring secure transmission and storage of sensitive data.
- 13. A list of approved entities, such as software applications or IP addresses, allowed to access a particular system or network.
Down
- 1. A person who exploits computer hardware and software, either for malicious purposes or ethical ones.
- 2. The practice of protecting computer systems, networks, and data from theft, damage, or unauthorized access.
- 4. Short for malicious software, it refers to any software designed to harm or exploit computer systems, including viruses, worms, and ransomware.
- 6. A technique where a person or program masquerades as someone or something else to deceive or gain an advantage, often used in phishing attacks.
- 7. A hidden method for bypassing normal authentication or encryption to access a computer system, often used by hackers.
- 9. Unauthorized access or entry into a computer system or network by an individual or software.
- 12. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, and credit card details, by posing as a trustworthy entity in electronic communication.