cybersecurity

12345678910
Across
  1. 3. worm A type of malware that spreads itself by copying itself to other computers on the same network (9 letters): _________ worm
  2. 5. Malicious software that is designed to gain access to a computer system without the user's consent (7 letters): ________
  3. 8. A technique used to trick users into revealing sensitive information, such as passwords or credit card numbers (9 letters): _________ing
  4. 9. A type of attack that involves intercepting and altering communication between two parties (10 letters): _________-in-the-middle attack
  5. 10. of Service A type of attack that attempts to make a computer or network resource unavailable to its intended users (8 letters): _________ of Service
Down
  1. 1. exploit A type of attack that targets vulnerabilities in software or hardware to gain unauthorized access (8 letters): _________ exploit
  2. 2. force A type of attack that involves guessing a password by trying many different combinations (9 letters): _________ force attack
  3. 4. The process of converting data into an unreadable format to prevent unauthorized access (8 letters): _________tion
  4. 6. A security protocol used to encrypt internet traffic (4 letters): ______
  5. 7. A type of authentication that uses physical characteristics, such as fingerprints or facial