Across
- 3. When data is transformed into a format that is unreadable without a decryption key
- 4. Software designed to harm or exploit any programmable device, service, or network
- 6. Someone who tests system security by trying to find vulnerabilities
- 7. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
- 8. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
- 9. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
- 1. A weak spot in a system’s security defenses
- 2. Malicious software that locks a user’s files and demands a ransom to restore access
- 5. A process used to verify a user’s identity, typically through passwords or biometrics
