Across
- 6. A type of virus that locks files until a ransom is paid -
- 9. Software embedded in hardware -
- 12. type of security attack where data is intercepted during transmission -
- 14. A set of rules for data transmission -
- 15. The process of confirming a user’s identity before granting access -
- 16. ADDRESS A unique identifier assigned to each device on a network -
- 18. BREACH A security breach where data is stolen or leaked -
- 19. Security based on physical characteristics -
- 20. A step-by-step procedure for solving a problem -
- 21. REPORT An official report of an attack, breach, or security incident -
- 23. An encrypted connection that protects data sent over the internet -
- 24. A method of verifying identity using two factors -
Down
- 1. Software that tracks user activities without their knowledge -
- 2. A system of interconnected devices -
- 3. A security system that monitors and controls incoming and outgoing network traffic -
- 4. A program that replicates itself and spreads from one device to another -
- 5. The practice of disguising digital messages to protect them from unauthorized access -
- 7. A software bug that allows unauthorized access to a system -
- 8. A secret code used to protect accounts -
- 10. A method for securing passwords -
- 11. An attempt to guess a password by trying many different combinations -
- 13. Malicious software designed to damage or disrupt systems -
- 17. An attack where someone tricks you into giving personal information -
- 22. A scam where an attacker pretends to be a trusted source -
- 25. harmful program disguised as a legitimate file or software -
