Across
- 3. A secret word or phrase that is used to access a computer system or service.
- 5. An alternative way to access software or hardware, typically unauthorized and implanted by intelligence agencies.
- 7. The method of obtaining user information through fraudulent communications targeted directly at people.
- 9. The way in which the identity of a user is confirmed.
- 10. security A technique for protecting computers, networks, programs, and
Down
- 1. A technique for protecting computers, networks, programs, data from unauthorized access or hackers for exploitation.
- 2. Software that automatically displays or downloads material when a user is offline.
- 4. are typically attached to files, applications or downloads that appear to be non-threatening elements. Once downloaded, opened or executed, it can piggyback onto programs to corrupt data or expand throughout a network and damage systems across a company.
- 6. Stands for the National Security Agency and is the official United States cryptologic organization under the Department of Justice.
- 8. A cyber attacker who uses software and social engineering methods to steal data and information. data from unauthorized access or hackers for exploitation.
