Across
- 2. This network security system acts as a barrier, controlling and monitoring incoming and outgoing traffic.
- 4. Enhances security by requiring users to provide two different authentication factors, often something they know and something they have.
- 7. The process of converting information into a code to secure it from unauthorized access.
- 8. Weaknesses or flaws in a system’s security that could be exploited by attackers.
- 9. A broad term for malicious software, including viruses, worms, and ransomware, designed to harm or exploit computer systems.
- 10. Cyber attackers often use deceptive emails or messages in an attempt to trick individuals into revealing sensitive information through this method.
Down
- 1. Software updates designed to fix security vulnerabilities and improve overall system performance.
- 3. Unauthorized access or breach into a system, network, or device.
- 5. The process of verifying the identity of a user, device, or system, typically through passwords or biometrics.
- 6. The art of writing or solving codes; used in cybersecurity to secure communication through encryption.