Across
- 3. The practice of protecting computer systems from theft, damage, and unauthorized access. (11)
- 5. A software program designed to prevent unauthorized access to a computer system. (8)
Down
- 1. A type of attack that attempts to overwhelm a system with traffic. (4)
- 2. A type of cyber attack that attempts to obtain sensitive information by tricking users. (6)
- 4. A type of encryption that uses two keys to encrypt and decrypt data. (3)