Across
- 4. A software designed to detect and remove viruses, malware, spyware, and other malicious programs from a computer system or network.
- 6. The process of converting information into a code or cipher to prevent unauthorized access. Encryption is commonly used to secure sensitive information such as passwords, financial data, and personal information.
- 7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized intrusions and cyber attacks.
- 8. Unsolicited and unwanted emails or messages sent out in bulk. Spam can be used to deliver malware, phishing attempts, or other types of unwanted content.
- 9. A weakness or security flaw in a computer system or network that can be exploited by attackers. Vulnerabilities can be caused by outdated software, misconfigured systems, or human error.
Down
- 1. A type of cyber attack where attackers create fake websites or emails to trick individuals into revealing personal or sensitive information. Phishing attacks often attempt to mimic legitimate websites or companies.
- 2. A secret code or word that allows you to access certain devices or services. It is important to create a strong password to protect yourself from cyber threats.
- 3. The process of verifying the identity of a user or device trying to access a system or network. Authentication is often done through the use of usernames and passwords, biometrics, or security tokens.
- 5. A software that is designed to harm or damage computer systems and networks. Malware can include viruses, trojans, ransomware, and other malicious programs.