Across
- 1. :malware that intervenes with the aim of harming the computer user
- 5. : security method based on identity and access management which requires two forms of identification to access resources and data.
- 7. : essential network devices that operate at the data link layer of the OSI model
- 8. : a person who is looking for ways to bypass software and hardware protections
- 9. : a kind of binder in which we store various files.
- 10. : Set of remote servers offering services accessible via the Internet.
Down
- 2. : a type of operating system commonly used on computers and laptops
- 3. : method used in cryptanalysis to find a password or a key
- 4. : an attack that takes advantage of a security vulnerability for which no patch has been implemented
- 6. : Software capable of detecting and eliminating computer viruses.
