Information Security

123456789101112131415
Across
  1. 3. A secret word or phrase that must be used to gain access to a system or service.
  2. 7. A technique that falsifies the identity or location of a sender or receiver.
  3. 8. A deliberate attempt to compromise or damage a system, network, or program.
  4. 11. The process of protecting data by secret code.
  5. 13. A cybercriminal who breaks into systems
  6. 14. A part of the internet that is hidden from regular search engines and requires special software to access.
  7. 15. A software program that enters a computer system without the owner’s knowledge or consent.
Down
  1. 1. The practice of protecting systems, networks, and programs from digital attacks.
  2. 2. A type of malware that infects and replicates itself on other files or programs
  3. 4. A small computer defect that causes errors or failures.
  4. 5. A small piece of data stored on a user’s browser that tracks their preferences or activities.
  5. 6. A fraudulent attempt to obtain sensitive information by impersonating a legitimate entity.
  6. 9. A type of malware that encrypts the victim’s data and demands payment for its decryption.
  7. 10. Unsolicited or unwanted messages sent over the internet, usually for advertising purposes.
  8. 12. A system that prevents unauthorized access to a network or device.