Across
- 1. – A secret string used to verify identity.
- 4. – An update that fixes software vulnerabilities.
- 5. – The process of converting data into code to prevent unauthorized access.
- 6. – A security threat originating from within an organization.
- 8. – Software designed to disrupt, damage, or gain unauthorized access.
Down
- 1. – Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity.
- 2. – Secure connection used to access a network remotely.
- 3. – A network security device that monitors and filters traffic.
- 7. – Unwanted or unsolicited email.
- 8. – A login method requiring two or more verification factors.
