Across
- 4. Manipulative tactics used by cybercriminals to trick people into divulging sensitive information or performing actions that compromise security.
- 7. The part of the internet not indexed by search engines and accessible only through special software, often associated with illegal activities.
- 9. An incident in which unauthorized individuals gain access to sensitive, protected, or confidential data.
- 10. An additional layer of security that requires a user to provide two separate pieces of evidence for authentication.
- 11. The process of converting data into a code to prevent unauthorized access.
- 12. A trial-and-error method used by attackers to gain access to an account or system by systematically guessing passwords or encryption keys.
- 14. A string of characters used to authenticate a user's identity and grant access to a computer system or account.
Down
- 1. Malicious software designed to infiltrate or damage computer systems, networks, or devices.
- 2. A virtual private network that extends a private network across a public network, allowing users to send and receive data securely and anonymously.
- 3. A type of malicious software that encrypts a victim's files and demands payment for their release.
- 5. The practice of protecting computer systems, networks, and data from digital attacks, damage, or unauthorized access.
- 6. A piece of information used to decrypt or encrypt data, ensuring its confidentiality and integrity.
- 8. A network of compromised computers remotely controlled by a cybercriminal to perform tasks such as launching attacks or sending spam emails.
- 13. A security system that controls incoming and outgoing network traffic based on predetermined rules.
- 14. A cyber attack that attempts to trick individuals into revealing sensitive information by posing as a trustworthy entity.