Across
- 2. A piece of software designed to fix security vulnerabilities or improve functionality.
- 4. The process of converting information into a code to prevent unauthorized access.
- 5. Software designed to harm or exploit computer systems and data.
- 9. Authentication based on physical or behavioral characteristics, such as fingerprints or voice patterns.
Down
- 1. Network security device that monitors and controls incoming and outgoing network traffic.
- 3. Process of verifying the identity of a user, system, or application.
- 6. The practice of protecting systems, networks, and programs from digital attacks.
- 7. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
- 8. Malicious software that can replicate itself and spread to other computers.