Across
- 1. Capturing data while it is being transmitted over a network.
- 3. Overloading a server with excessive traffic to disrupt service.
- 5. Redirecting users to fake websites to steal personal data.
- 6. Deceptive attack tricking users into revealing sensitive information.
- 8. Security method using physical traits like fingerprints or facial recognition.
- 9. Restricting system access based on user roles.
- 12. Extra security layer requiring two authentication factors.
- 13. Software that detects and removes malicious programs.
Down
- 2. Malware disguised as legitimate software to trick users.
- 4. An intermediary server between users and websites for security and privacy.
- 5. Secret string of characters used for authentication.
- 7. System that filters and blocks unauthorized network traffic.
- 8. Repeatedly guessing passwords to gain unauthorized access.
- 10. Malware that secretly collects user information without consent.
- 11. Manipulating people into giving away confidential information.
