Across
- 5. A type of cyber attack that involves stealing sensitive information, such as credit card numbers or personal identification.
- 6. A threat that originates from outside an organization's network.
- 7. A type of cyber attack that involves tricking a user into revealing sensitive information, such as passwords or credit card numbers.
- 8. A barrier that controls incoming and outgoing network traffic based on predetermined security rules.
Down
- 1. Computer programs and related data that provide the instructions for telling a computer what to do and how to do it.
- 2. A type of cyber attack that involves using social engineering techniques to manipulate individuals into divulging sensitive information or performing actions that may compromise their own or an organization's security.
- 3. The process of protecting computers, networks, and data from unauthorized access or attacks.
- 4. Intending or likely to cause harm or mischief.