CyberSecurity 1

12345678
Across
  1. 1. A type of attack where a hacker overloads a server with traffic to make it crash.
  2. 4. A type of malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
  3. 5. A method of encoding data to protect its confidentiality.
  4. 7. A security method that requires two forms of identification, such as a password and a fingerprint.
  5. 8. A commonly used firewall bypass technique that hides the source IP address.
Down
  1. 2. The practice of defending systems and networks from digital attacks.
  2. 3. A system that detects and prevents unauthorized access to computer networks.
  3. 6. The act of impersonating a legitimate entity to steal sensitive information.