Across
- 3. A weakness in a system’s design or configuration that could be exploited by attackers to compromise security.
- 4. A social engineering technique where attackers impersonate a legitimate entity to trick individuals into revealing sensitive information.
- 7. A deliberate attempt to compromise computer systems, networks, or data using various techniques.
- 8. A network security device that filters incoming and outgoing traffic to protect against unauthorized access and cyber threats.
Down
- 1. The process of converting data into a secure code to prevent unauthorized access during transmission or storage.
- 2. A software update released to fix vulnerabilities and improve security in applications or systems.
- 5. ______ Engineering: Manipulating individuals to divulge confidential information or perform actions that compromise security.
- 6. Malicious software designed to harm, disrupt, or gain unauthorized access to computer systems or data.
