cybersecurity axel

12345678910111213
Across
  1. 1. – A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
  2. 9. – The process of confirming that someone or something is genuine.
  3. 11. – Software designed to harm or exploit any device, service, or network.
  4. 12. - Protocol similar to arp , but for IPv6
  5. 13. – A secret word or phrase used to verify a user’s identity.
Down
  1. 2. - Type of malware that secretly gathers information from an infected computer.
  2. 3. - Code that assigns a numerical value to basic English letters, characters, and symbols
  3. 4. - Used to perform distributed denial-of-service (DDoS) attacks.
  4. 5. - Secret method of bypassing normal authentication or security controls.
  5. 6. - A standalone malware that replicates itself in order to spread to other computers.
  6. 7. - A group of communicating computers and peripherals known as hosts
  7. 8. – An attempt to damage, steal, or disrupt digital systems or networks.
  8. 10. – The process of converting data into a code to prevent unauthorized access