Across
- 3. Unauthorized access to or manipulation of computer systems.
- 5. A program that protects your computer from viruses
- 8. A network security device that monitors and controls incoming and outgoing traffic.
- 9. A process used to confirm the identity of a user.
Down
- 1. A method of stealing personal information by pretending to be a trustworthy source.
- 2. A type of software designed to harm or exploit systems
- 4. A weak point in a system that can be exploited.
- 6. A secret code used to secure data.
- 7. A person who attempts to gain unauthorized access to networks.
