Across
- 2. A piece of software designed to update or fix vulnerabilities in a computer program.
- 6. The practice of protecting systems, networks, and programs from digital attacks.
- 8. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- 9. Software designed to harm or gain unauthorized access to a computer system.
- 10. A secret combination of characters used to gain access to a system.
Down
- 1. A network security system that monitors and controls incoming and outgoing network traffic.
- 3. Software designed to detect and remove malicious software.
- 4. Software that secretly gathers information about a person or organization.
- 5. A type of malware disguised as legitimate software.
- 7. The process of converting information into a code to prevent unauthorized access.