Across
- 5. The practice of accessing a computer or network without authorization.
- 6. Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
- 7. A technique used to verify the identity of a user by requiring two different forms of authentication.
- 9. A unique string of characters used to authenticate a user's identity.
Down
- 1. A program designed to prevent unauthorized access to or from a private network.
- 2. Malicious software designed to gain unauthorized access to a computer system.
- 3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
- 4. A piece of software designed to block access to a computer system until a sum of money is paid.
- 8. A method of protecting sensitive data by converting it into an unreadable format.