Across
- 3. Security mechanism that involves multiple authentication methods (3 letters)
- 5. The process of encoding data to keep it secure(10 letters)
- 8. A Weakness in a system that can be exploited (13 letters)
- 9. Process of finding and fixing errors in code (9 letters)
- 10. An attack where a hacker tricks someone into revealing confidential information(8 letters)
Down
- 1. Security incident where sensitive data is exposed to unauthorized parties (8 letters)
- 2. A hidden or disguised computer virus(6 letters)
- 4. A protection layer to prevent unauthorized access to a network(8 letters)
- 6. Authentication factor using your fingerprint or face (10 letters)
- 7. Online platform for hosting and reviewing code (6 letters)