Across
- 2. | Network of infected computers controlled by a hacker
- 4. | Security risk originating from within an organization
- 8. | Secret string of characters used to access an account
- 12. | Unwanted or unsolicited digital messages
- 13. | Malicious program that replicates and spreads between computers
- 14. | Person who gains unauthorized access to computer systems
- 17. | Process of converting data into a secure coded form
- 18. | Practice of protecting systems, networks, and data from attacks
- 20. | Malware that locks data and demands payment for its release
- 21. | Faking identity or source of communication to trick systems or users
Down
- 1. | Weakness in a system that can be exploited by attackers
- 3. | Secure connection that encrypts internet traffic over a network
- 5. | Hidden part of the internet not indexed by standard search engines
- 6. | Software designed to detect and remove malicious programs
- 7. | Fraudulent attempt to obtain sensitive information via fake messages
- 9. | Process of verifying a user's identity
- 10. | Passwordless authentication method using cryptographic keys
- 11. | Incident where sensitive information is exposed or stolen
- 15. | Software designed to harm or exploit devices or networks
- 16. | Security system that monitors and controls network traffic
- 19. | Protection of personal and sensitive information
