Across
- 1. A type of malware that demands payment.
- 4. Someone who gains unauthorized access to systems.
- 9. Keeping information secret and private.
- 12. Protects a network by filtering traffic.
- 13. drive Removable storage that can carry malware.
- 15. Protects your computer from malicious software.
- 17. Secret code used to verify identity.
- 19. Regularly updating software to fix vulnerabilities.
- 20. Software that detects threats using patterns.
Down
- 2. Process of proving you are who you say you are.
- 3. Person who targets specific victims using customized phishing.
- 5. A device that stores authentication codes.
- 6. Converts information into unreadable form.
- 7. Strategy to minimize impact of incidents.
- 8. Attempt to trick people into revealing personal information.
- 10. Rules for handling data and systems.
- 11. breach Unauthorized duplication of data.
- 14. Physical security measure to enter restricted areas.
- 16. Unwanted or junk email.
- 18. Secure wireless network protocol.
