Across
- 3. Adhering to regulatory requirements and industry standards for data protection and privacy in cloud environments.
- 6. Infectious software
- 7. Type of attack that tricks users into revealing sensitive info
- 8. Type of malware that allows an attacker to remotely control a system or network
- 9. A security method that uses unique biological characteristics, such as fingerprints or facial recognition, to unlock your mobile device
- 11. A type of software that is designed to damage or exploit a computer system
Down
- 1. Attack where an attacker gains unauthorized access to a system or network
- 2. Unwanted emails
- 4. The process of verifying the identity of a user, device, or system
- 5. A type of malware that demands payment in exchange for restoring access to data
- 6. A network that encrypts internet connections and helps secure remote access to a network
- 10. Creating a copy of data to prevent its loss in case of a disaster or data breach