Across
- 1. The form of encryption that requires a single key
- 5. An important process that verifies a user is really who they are; many different ways this can be done.
- 7. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
- 9. The _________ is used to verify that data is not modified, tampered with, or corrupted
- 10. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
Down
- 2. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
- 3. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
- 4. unique address that identifies a device on the internet or a local network.
- 6. Special virus that moves from computer to computer without human interaction.
- 8. An ________ is a program or code that makes use of the vulnerability in an application or system.
- 9. a person who uses computers to gain unauthorized access to data.
