Cybersecurity and Cryptography

123456789101112131415
Across
  1. 4. What device monitors and controls incoming and outgoing network traffic?
  2. 8. What is a digital document that verifies the ownership of a public key?
  3. 9. term describes a weakness in a system that can be exploited by threats?
  4. 10. What is the process of converting data into a fixed-size string of characters for security?
  5. 11. What is the process of converting plaintext into ciphertext to protect information?
  6. 12. What is the process of converting ciphertext back into plaintext?
  7. 14. What type of malware disguises itself as legitimate software?
  8. 15. What type of malware records keystrokes made by a user?
Down
  1. 1. What is a physical or digital object used to prove identity in security systems?
  2. 2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
  3. 3. What term refers to malicious software designed to harm or exploit devices?
  4. 5. What term refers to the permission to enter or use a system or network?
  5. 6. What protocol secures data sent over the internet by encrypting it?
  6. 7. What is the process of verifying the identity of a user or system?
  7. 13. What is the process of creating copies of data to restore in case of loss?