Across
- 3. A secret combination of characters used to authenticate users and protect accounts.
- 6. A weakness or flaw in a system that can be exploited by attackers.
- 7. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 8. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
- 1. A barrier that monitors and controls incoming and outgoing network traffic.
- 2. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
- 4. The process of verifying the identity of a user or system.
- 5. The process of converting data into a code to prevent unauthorized access.