Across
- 4. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
- 6. Converting data into a code to prevent unauthorized access, especially during transmission.
- 7. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- 9. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- 10. Verifying the identity of users or systems to ensure secure access.
Down
- 1. Malware that encrypts files, demanding payment for their release.
- 2. An update to fix vulnerabilities or improve security in software or systems.
- 3. Pertaining to the security challenges and measures for smartphones and tablets.
- 5. Safeguarding personal information to ensure confidentiality and compliance with regulations.
- 8. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.