Computer security

123456789
Across
  1. 3. of using multiple methods to authenticate a user's identity before granting access to a computer system.
  2. 4. of analyzing and identifying potential vulnerabilities in computer systems.
  3. 5. of computer systems and data from damage or destruction caused by natural disasters, accidents, or deliberate attacks.
  4. 6. of rules or protocols that dictate how data is transmitted and received over a network.
  5. 8. method that uses a single secret key to both encrypt and decrypt data.
  6. 9. software that is designed to harm or exploit computer systems.
Down
  1. 1. of keeping software up-to-date with the latest security patches and updates to protect against known vulnerabilities.
  2. 2. of encoding messages or information in such a way that only authorized parties can read it.
  3. 4. of computer systems from unauthorized access and theft of data (two words).
  4. 7. designed to prevent unauthorized access to a computer or network.