Across
- 2. Software update designed to fix security vulnerabilities.
- 8. Interconnected computers facilitating communication and data exchange.
- 10. Measures to protect computer systems from attacks.
- 12. Hint: Verifying the identity of a user through passwords or biometrics.
- 13. Secret code for user access.
- 14. Deceptive emails or websites aiming to steal data.
- 15. breach Unauthorized access leading to the exposure of sensitive information.
Down
- 1. Software designed to harm or exploit computer systems.
- 3. Software designed to detect and remove malicious programs.
- 4. Converts sensitive information into a secret code.
- 5. Unauthorized access or breach into a system.
- 6. Deliberate exploitation of computer systems for malicious purposes.
- 7. Acts as a digital barrier to unauthorized access.
- 9. Requires two forms of identification for access.
- 11. Hint: Weakness in a system that could be exploited by attackers.