Across
- 6. A security measure that involves verifying the identity of a user or system.
- 7. Secret code that must be entered to access a computer or network.
- 10. The study of secure communication and storage of information.
- 12. Barrier that prevents unauthorized access to or from a private network.
- 13. The practice of stealing personal information to commit fraud.
- 15. Person who gains unauthorized access to computer systems for malicious purposes.
- 16. An attack that involves flooding a network with traffic to make it unavailable.
Down
- 1. Unauthorized access, disclosure, or acquisition of sensitive information.
- 2. Type of malicious software that can replicate and spread to other computers.
- 3. Software designed to harm or exploit computers or networks.
- 4. Process of converting information or data into a code to prevent unauthorized access.
- 5. A program or set of programs that runs on a computer to carry out tasks.
- 8. Software designed to detect and remove computer viruses.
- 9. A set of rules governing the exchange or transmission of data.
- 11. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 14. Type of malicious software disguised as legitimate software.