Across
- 4. What device monitors and controls incoming and outgoing network traffic?
- 8. What is a digital document that verifies the ownership of a public key?
- 9. term describes a weakness in a system that can be exploited by threats?
- 10. What is the process of converting data into a fixed-size string of characters for security?
- 11. What is the process of converting plaintext into ciphertext to protect information?
- 12. What is the process of converting ciphertext back into plaintext?
- 14. What type of malware disguises itself as legitimate software?
- 15. What type of malware records keystrokes made by a user?
Down
- 1. What is a physical or digital object used to prove identity in security systems?
- 2. What is the fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity?
- 3. What term refers to malicious software designed to harm or exploit devices?
- 5. What term refers to the permission to enter or use a system or network?
- 6. What protocol secures data sent over the internet by encrypting it?
- 7. What is the process of verifying the identity of a user or system?
- 13. What is the process of creating copies of data to restore in case of loss?