Across
- 2. Fake system set up to lure hackers.
- 3. Unauthorized access to data or systems
- 6. Fake emails or messages to steal information
- 7. Malware that locks files and demands payment.
- 9. Code used to take advantage of a vulnerability.
- 12. Hacker intercepts communication between two parties.
- 16. Securing data by converting it into unreadable code.
- 17. Encrypts internet traffic for secure browsing
Down
- 1. Authentication Verifying identity using two methods.
- 4. EU law protecting personal data privacy.
- 5. Security barrier between trusted and untrusted networks.
- 8. Process of verifying a user’s identity.
- 10. Username and password for authentication.
- 11. Malicious code that spreads through files or programs
- 13. Software that protects against malicious programs.
- 14. Malware disguised as legitimate software.
- 15. Isolated environment for testing suspicious files
- 18. Security rules for handling credit card data.
