Across
- 4. illegal act of accessing a computer system without permission
- 5. act of preventing unauthorized access to data and systems
- 6. safeguard against unauthorized access to a computer network
- 8. type of harmful software that can infect a computer
- 9. protocol that helps protect your online communications from eavesdropping
- 10. process of regularly backing up data
- 12. technique of disguising a message or data to hide its content
- 14. password that is difficult for others to guess
- 15. use of two or more authentication methods for accessing an account
- 16. type of attack that overwhelms a system with excessive traffic
Down
- 1. secure way to access the internet and protect data in transit
- 2. act of monitoring and protecting computer networks and systems
- 3. weak point in a system that can be exploited
- 7. term that refers to a person who gains unauthorized access to a computer system
- 11. practice of tricking someone into providing sensitive information
- 13. software program that detects and removes malicious software
