Across
- 2. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
- 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 6. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
- 7. Unauthorized access to a network, information systems, or application.
- 9. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
- 1. The process of converting information or data into a code, especially to prevent unauthorized access.
- 3. The process of recognizing a user's identity to ensure that individuals are who they claim to be.
- 5. A type of surveillance software that has the capability to record every keystroke made on a computer.
- 8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
- 9. A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.