Across
- 5. The process of verifying the identity of a user or device (10 letters)
- 8. - A type of attack where an attacker intercepts communication between two parties (6 letters)
- 10. - The practice of disguising malicious files to make them appear harmless (7 letters)
- 11. -A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- 12. - A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
Down
- 1. - Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- 2. - A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
- 3. -A set of rules or guidelines designed to enhance computer security (9 letters)
- 4. -A program designed to prevent, detect, and remove malware (10 letters)
- 6. - The exploitation of security vulnerabilities in a computer system or network (9 letters)
- 7. - Protects a computer system from unauthorized access (9 letters)
- 9. - The unauthorized copying of data from a computer system (6 letters)
