Across
- 2. Comprised of any number and variety of interconnected devices
- 3. a person, who attacks a specific computer system, often to steal or corrupt sensitive information or data about a company or a product.
- 4. weaknesses in software programs that can be exploited by hackers to compromise computers.
- 6. string of characters used to verify the identity of a n user during the authentication process
- 8. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
- 9. A weak spot in the computer system, which can be used to attack the system / taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
Down
- 1. software that scans a device or a network to detect security threats, alert you, and neutralize malicious code.
- 3. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 5. a network security system that filters unsanctioned incoming and outgoing traffic.
- 7. a type of malware that is aimed to infect and harm a file, a system or a network