Across
- 3. theft: The crime of obtaining personal information and using it to assume someone else's identity.
- 4. This is the overall practice of protecting systems, networks, and data from digital attacks.
- 5. A piece of software designed to fix a vulnerability or bug.
- 8. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- 9. A weakness in a computer system that can be exploited by attackers.
- 10. A type of malware that restricts access to a computer system or data until a ransom is paid.
Down
- 1. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- 2. The process of converting information into a secret code to prevent unauthorized access.
- 6. authentication (2FA): A security process that requires two forms of identification, such as a password and a code sent to your phone.
- 7. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.