Across
- 3. Weaknesses or flaws in software, hardware, or network infrastructure that can be exploited by attackers to compromise the security of a system.
- 8. The process of converting data into a form that is unreadable without the correct decryption key, thereby protecting it from unauthorized access.
- 10. The process of verifying the identity of a user or device attempting to access a system, often through passwords, biometric scans, or two-factor authentication methods.
Down
- 1. Deliberate actions taken by hackers or malicious entities to disrupt, damage, or gain unauthorized access to computer systems, networks, or data.
- 2. A type of cyber attack in which attackers impersonate legitimate entities to deceive individuals into providing sensitive information, such as passwords or financial data.
- 4. Unauthorized access or attempted access to a computer system or network by an individual or automated process.
- 5. Authentication techniques that rely on unique biological characteristics, such as fingerprints, iris scans, or facial recognition, to verify the identity of individuals accessing a system or device.
- 6. A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 7. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems or data, often spread through email attachments, infected websites, or removable media.
- 9. A software update designed to fix security vulnerabilities or address other issues within a program or operating system.