Across
- 1. Protection against unauthorized access to personal data
- 5. A type of malware that encrypts data and demands payment for the decryption key
- 9. The process of checking the identity of a user, device, or entity
- 11. A secure gateway that controls traffic between an internal network and the internet
- 13. Software designed to detect, prevent, and remove malware
- 15. Process of converting data into a secret code to prevent unauthorized access
- 16. The secure process of logging into a system with two layers of security
Down
- 2. The practice of attempting to gain unauthorized access to networks by breaking into systems
- 3. Type of security that protects the flow of data on the internet
- 4. A malicious program designed to harm or exploit any programmable device
- 6. The most common method used by hackers to steal sensitive information through email
- 7. Unauthorized access to a computer system to steal or manipulate data
- 8. A cyber attack that floods a network or service to overwhelm it and make it unavailable
- 10. A weakness or flaw in a computer system that can be exploited by hackers
- 12. The study of secure communication in the presence of adversaries
- 14. An attack where an adversary impersonates another user to gain information