Across
- 4. Software designed to detect, prevent, and remove malware and other harmful software.
- 8. Measures or controls taken to protect systems, networks, and data from unauthorized access or harm.
- 9. A secret string of characters used to verify the identity of a user.
- 10. An attempt by hackers to damage or disrupt a computer system or network.
- 12. Ensuring that an organization meets regulatory and legal requirements for security practices.
- 14. Software that secretly monitors and collects personal information from a computer.
- 15. A shortened term for a festival or event, often used for gatherings celebrating specific themes like technology or cybersecurity.
- 16. The process of verifying the identity of a user or device before granting access to a system.
Down
- 1. Related to computers, information technology, or virtual reality, often used in the context of online environments.
- 2. The process of converting data into a secret code to protect it from unauthorized access.
- 3. A weakness in software, hardware, or procedures that could be exploited to cause harm.
- 5. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 6. The use of software or hardware to record keystrokes typed on a computer, often used to steal passwords or personal information.
- 7. Any software intentionally designed to cause damage to a computer, server, or network.
- 11. A person who uses computers to gain unauthorized access to data.
- 13. A fraudulent attempt to obtain sensitive information, such as passwords, by pretending to be a trustworthy entity.