Across
- 3. Software designed to disrupt, damage, or gain unauthorized access to a computer system
- 4. Where the recruitment, retention and advancement of women in cybersecurity happens.
- 6. Taking advantage of a vulnerability or flaw in a network system to penetrate or attack it
- 7. A term used to describe a person who tries to gain unauthorized access to a network or computer system
- 8. A service that encrypts users' data and masks their IP addresses
- 9. Contains items that are temporarily blocked until an additional step is performed
- 10. The practice of sending fraudulent communications that appear to come from a legitimate source
Down
- 1. A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules
- 2. The process of converting information into ciphertext
- 5. The process of decoding cipher text to plain text