Across
- 4. A secret word or phrase used to authenticate access to a system or account.
- 5. The process of converting information into a secure format to prevent unauthorized access.
- 7. Software designed to detect and remove malicious software from a computer.
- 9. A software update that fixes vulnerabilities and improves security.
Down
- 1. A method of authentication that requires two different forms of identification to access an account.
- 2. A copy of data stored separately to prevent data loss in case of a cyber attack or system failure.
- 3. The process of installing the latest versions of software to protect against vulnerabilities
- 4. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
- 6. A network security system that monitors and controls incoming and outgoing network traffic.
- 8. A Virtual Private Network that creates a secure connection over the internet.
