cybersecurity

12345678910
Across
  1. 1. :malware that intervenes with the aim of harming the computer user
  2. 5. : security method based on identity and access management which requires two forms of identification to access resources and data.
  3. 7. : essential network devices that operate at the data link layer of the OSI model
  4. 8. : a person who is looking for ways to bypass software and hardware protections
  5. 9. : a kind of binder in which we store various files.
  6. 10. : Set of remote servers offering services accessible via the Internet.
Down
  1. 2. : a type of operating system commonly used on computers and laptops
  2. 3. : method used in cryptanalysis to find a password or a key
  3. 4. : an attack that takes advantage of a security vulnerability for which no patch has been implemented
  4. 6. : Software capable of detecting and eliminating computer viruses.