Across
- 3. A security system that monitors and controls incoming and outgoing network traffic
- 4. A security model that requires strict identity verification for every person and device trying to access resources on a network
- 6. Software that secretly gathers information about a user's activities
- 8. The process of encoding information to protect it from unauthorized access
- 10. Malicious software that misleads users of its true intent by disguising itself as legitimate software
Down
- 1. Manipulating people into divulging confidential information
- 2. Phishing attacks conducted via SMS messages
- 5. A malware designed to deny a user or organization access to files on their computer
- 7. A type of online scam that tricks people into sharing sensitive information, such as login credentials and credit card numbers
- 9. Small files stored on a user’s system to recognize the user and track preferences