Across
- 2. Software designed to damage or disrupt a computer system.
- 4. Process of converting information or data into a code to prevent unauthorized access.
- 5. Trying to get sensitive information like usernames, passwords, and credit card details by pretending to be someone trustworthy.
- 7. Secret word or phrase used for authentication and access control.
- 8. Deliberate exploitation of computer systems, networks, or technology-dependent enterprises.
Down
- 1. Protection of internet-connected systems, including hardware, software, and data, from cyberattacks.
- 3. Software designed to detect and remove viruses and other malicious software.
- 6. Network security system designed to prevent unauthorized access
- 7. Update to fix vulnerabilities or improve functionality in software.