Across
- 3. of using multiple methods to authenticate a user's identity before granting access to a computer system.
- 4. of analyzing and identifying potential vulnerabilities in computer systems.
- 5. of computer systems and data from damage or destruction caused by natural disasters, accidents, or deliberate attacks.
- 6. of rules or protocols that dictate how data is transmitted and received over a network.
- 8. method that uses a single secret key to both encrypt and decrypt data.
- 9. software that is designed to harm or exploit computer systems.
Down
- 1. of keeping software up-to-date with the latest security patches and updates to protect against known vulnerabilities.
- 2. of encoding messages or information in such a way that only authorized parties can read it.
- 4. of computer systems from unauthorized access and theft of data (two words).
- 7. designed to prevent unauthorized access to a computer or network.
