Crossword Puzzle

12345678910111213141516
Across
  1. 6. A deceptive attempt to obtain sensitive information, such as usernames and passwords, by impersonating a trustworthy entity in electronic communication.
  2. 7. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
  3. 8. An attack that attempts to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  4. 10. A security method where access is granted only after successfully presenting two or more pieces of evidence.
  5. 11. A person who gains unauthorized access to computer systems, often with malicious intent.
  6. 12. The practice of protecting computer systems and networks from digital attacks and threats.
  7. 14. A system designed to prevent unauthorized access to or from a private network.
  8. 15. A set of rules for communication between devices on a network.
  9. 16. A digital certificate used to verify the identity of a website or email sender.
Down
  1. 1. Unauthorized access to a computer system or network.
  2. 2. A security measure that monitors and controls network traffic, acting as a barrier against unauthorized access.
  3. 3. A program that appears legitimate but performs malicious activities in the background.
  4. 4. The process of converting information or data into a code, especially to prevent unauthorized access.
  5. 5. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  6. 6. A secret string of characters used to verify a user's identity when logging into a system.
  7. 9. A software vulnerability that allows a hacker to gain administrative control over a target system.
  8. 13. A program that can replicate itself and spread to other computers, often causing damage.