Across
- 5. This malicious software holds your data hostage until a ransom is paid
- 6. The process of verifying a user's identity
- 8. A deceptive email attempt to steal personal information
- 9. Malicious software designed to harm a computer system
- 10. Scrambling data to make it unreadable without a key
- 11. Process of identifying and correcting security vulnerabilities in a
Down
- 1. A security incident where sensitive data is exposed
- 2. Software program designed to block unauthorized access while
- 3. An attack that overwhelms a server with traffic, making it unavailable
- 4. Software that scans for and neutralizes viruses and other malicious
- 7. system.
- 8. authorized communications.
