Across
- 4. The use of physical characteristics, such as fingerprints, to verify identity.
- 5. A copy of data stored separately to protect against data loss.
- 8. Software that secretly monitors and collects information about users.
- 11. A service that encrypts your internet connection and hides your IP address.
- 12. A type of malware that threatens to publish or block access to data unless a ransom is paid.
- 14. A type of cyber attack that attempts to trick individuals into providing sensitive information.
Down
- 1. The process of verifying the identity of a user or device.
- 2. The practice of protecting systems, networks, and programs from digital attacks.
- 3. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
- 6. Software designed to detect and destroy computer viruses.
- 7. A secret word or phrase used to gain access to a system.
- 9. A network security device that monitors and filters incoming and outgoing network traffic.
- 10. The process of converting information or data into a code to prevent unauthorized access.
- 13. Unwanted or unsolicited email messages.
- 15. An individual who uses technical skills to gain unauthorized access to systems.
