Across
- 4. A barrier between a trusted internal network and untrusted external networks.
- 5. The process of converting a coded data back into its original format.
- 7. The process of converting data into a coded format to prevent unauthorized access.
- 9. Intercepting communication between two parties without their t their knowledge.
Down
- 1. Malicious computer software.
- 2. A secret pathway that allows unauthorized access to a system or software.
- 3. A person who tries to gain unauthorized access.
- 6. A method for forcing a password.
- 8. Tricking someone into giving informations over the internet.
