Cyber Threats & Security

1234567891011121314
Across
  1. 4. Deceptive attack tricking users into revealing sensitive information.
  2. 6. Malware disguised as legitimate software to trick users.
  3. 7. Extra security layer requiring two authentication factors.
  4. 11. Software that detects and removes malicious programs.
  5. 13. Security method using physical traits like fingerprints or facial recognition.
  6. 14. System that filters and blocks unauthorized network traffic.
Down
  1. 1. Capturing data while it is being transmitted over a network.
  2. 2. Overloading a server with excessive traffic to disrupt service.
  3. 3. Repeatedly guessing passwords to gain unauthorized access.
  4. 4. Redirecting users to fake websites to steal personal data.
  5. 5. Manipulating people into giving away confidential information
  6. 8. Restricting system access based on user roles.
  7. 9. An intermediary server between users and websites for security and privacy.
  8. 10. Secret string of characters used for authentication.
  9. 12. Malware that secretly collects user information without consent.(Social Engineering) Manipulating people into giving away confidential information.