Across
- 4. Protects systems by controlling incoming and outgoing network traffic.
- 8. Malicious software that blocks access to data until a ransom is paid.
- 11. Virtual Private Network, enhances online privacy and security.
- 12. Software designed to disrupt, damage, or gain unauthorized access to systems.
- 14. Small data stored on a user's computer by a website.
- 16. A string of characters used to authenticate access to a system.
- 17. Regularly applied software improvements for security and functionality.
- 18. An attack that floods a system with traffic to disrupt its normal operations.
- 19. Moral principles guiding responsible use of technology.
Down
- 1. Fraudulent attempt to obtain sensitive information through deceptive emails.
- 2. Information processed or stored by a computer.
- 3. A group of interconnected devices sharing resources.
- 5. A type of malware disguised as legitimate software.
- 6. A barrier to protect a network from unauthorized access.
- 7. Software designed to detect and remove malicious programs.
- 9. Software that secretly gathers user information without consent.
- 10. Unwanted or junk email messages.
- 13. The process of converting data into a code to prevent unauthorized access.
- 15. A set of rules governing data communication over a network.
- 20. A person who exploits weaknesses in computer systems or networks.
