Across
- 2. A security process that requires users to provide two different authentication factors before gaining access.
- 6. Acts as a barrier between a trusted network and an untrusted network, controlling incoming and outgoing traffic.
- 7. Manipulating individuals to divulge confidential information through psychological manipulation rather than technical means.
- 9. An acronym for "Virtual Private Network," it provides a secure and encrypted connection over a public network, enhancing privacy.
- 10. Authentication based on unique physical or behavioral characteristics, such as fingerprints or facial recognition.
- 11. A term used to describe various types of malicious software, including viruses, worms, Trojans, and ransomware.
- 13. A secret combination of characters used to authenticate a user and protect an account from unauthorized access.
- 15. An update to a software or operating system that addresses security vulnerabilities and improves performance.
Down
- 1. An acronym for "Denial of Service," a type of cyber attack that overwhelms a system's resources to disrupt normal operation.
- 3. The practice of protecting computer systems, networks, and data from unauthorized access and cyber attacks.
- 4. The process of converting data into a code to prevent unauthorized access, ensuring data confidentiality.
- 5. The process of examining network traffic to identify anomalies and potential security threats.
- 8. Software designed to detect, prevent, and remove malicious software from a computer or network.
- 12. A type of malware that disguises itself as legitimate software but contains malicious code to harm a computer system.
- 14. A cyber attack where the attacker poses as a trustworthy entity to deceive individuals into revealing sensitive information.