Across
- 6. A deceptive attempt to obtain sensitive information, such as usernames and passwords, by impersonating a trustworthy entity in electronic communication.
- 7. A type of malicious software designed to block access to a computer system or data until a sum of money is paid.
- 8. An attack that attempts to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- 10. A security method where access is granted only after successfully presenting two or more pieces of evidence.
- 11. A person who gains unauthorized access to computer systems, often with malicious intent.
- 12. The practice of protecting computer systems and networks from digital attacks and threats.
- 14. A system designed to prevent unauthorized access to or from a private network.
- 15. A set of rules for communication between devices on a network.
- 16. A digital certificate used to verify the identity of a website or email sender.
Down
- 1. Unauthorized access to a computer system or network.
- 2. A security measure that monitors and controls network traffic, acting as a barrier against unauthorized access.
- 3. A program that appears legitimate but performs malicious activities in the background.
- 4. The process of converting information or data into a code, especially to prevent unauthorized access.
- 5. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
- 6. A secret string of characters used to verify a user's identity when logging into a system.
- 9. A software vulnerability that allows a hacker to gain administrative control over a target system.
- 13. A program that can replicate itself and spread to other computers, often causing damage.
