Across
- 5. Unwanted emails sent in bulk to promote a product
- 7. Short for "virtual private network"
- 8. A way to protect data by scrambling it
- 10. A backup copy of data in case of loss
- 14. Hacking into a system without permission.
- 15. Keeping data safe from unauthorized access, modification, and deletion
- 17. Attack that encrypts files and demands payment
- 19. Impersonating a trusted entity to steal information
Down
- 1. Short for "denial-of-service" attack
- 2. The process of identifying and fixing security vulnerabilities
- 3. Software that protects against viruses and malware
- 4. A sequence of characters used to gain access to a system
- 6. Weak point in a system that can be exploited
- 9. Malicious software disguised as a legitimate program
- 11. Network filtering system to control traffic
- 12. Two-factor authentication often uses this
- 13. A device that blocks unauthorized access to a network
- 16. Social engineering technique using deception to gain information
- 18. Strong passwords should include these
