Across
- 5. A type of attack that floods a network or server with traffic in order to disrupt its normal operation (4 letters)
- 7. A technique used to gain unauthorized access to information in a system by pretending to be someone else (11 letters)
- 9. A program designed to prevent, detect, and remove malware (10 letters)
- 10. The process of verifying the identity of a user or device (10 letters)
- 12. A technique used to ensure that data remains confidential and cannot be accessed by unauthorized users (9 letters)
Down
- 1. The exploitation of security vulnerabilities in a computer system or network (9 letters)
- 2. Protects a computer system from unauthorized access (9 letters)
- 3. Malicious software designed to block access to a computer system until a sum of money is paid (9 letters)
- 4. The practice of disguising malicious files to make them appear harmless (7 letters)
- 6. A set of rules or guidelines designed to enhance computer security (9 letters)
- 8. A type of attack where an attacker intercepts communication between two parties (6 letters)
- 11. The unauthorized copying of data from a computer system (6 letters)
