Across
- 9. The process of transforming data into a secret code
- 10. A weak point in a system that can be exploited
- 11. Protects digital data by requiring two forms of authentication
- 14. The action of intercepting communication without permission
- 15. An encrypted tunnel used for secure internet communication
- 16. A deceptive method used to trick systems into executing harmful code
- 17. A software update meant to fix bugs or vulnerabilities
- 20. The overall practice of protecting networks and systems from digital attacks
- 21. A malicious program that replicates itself
Down
- 1. The concept of ensuring only authorized users have access to data
- 2. Software designed to protect against malware
- 3. A method used to guess a password by systematically checking all possibilities
- 4. A type of software that monitors and blocks unauthorized network traffic
- 5. A program that logs user keystrokes to steal information
- 6. Unsolicited or junk email
- 7. A small piece of malicious software disguised as legitimate software
- 8. A person who tests security systems legally to find vulnerabilities
- 12. A database of known vulnerabilities used by security analysts
- 13. A type of attack that overwhelms a network with traffic
- 15. A tool used to scan for vulnerabilities in a system
- 18. A technique used by attackers to trick users into providing sensitive information
- 19. The unauthorized access and use of data