Across
- 2. A program that spreads to other devices by attaching itself to files or programs.
- 5. A digital barrier to keep unauthorized users out of a network or device.
- 7. A unique string of characters used to verify identity.
- 8. The practice of protecting data by converting it into unreadable code.
- 9. Software used to detect and prevent malware on a system.
- 10. A technique used to trick users into providing sensitive information.
- 11. A technique where criminals trick users into revealing personal data by pretending to be a trustworthy entity.
Down
- 1. An attack that floods a network or website, overwhelming its capacity.
- 2. Weak points that hackers exploit in software or hardware.
- 3. A method of verifying identity using two or more methods (e.g., password and token).
- 4. A harmful program that appears legitimate but performs malicious functions.
- 6. The act of gaining unauthorized access to a computer system.
- 12. The unauthorized copying, use, or distribution of software.