Across
- 3. A secure network that hides your IP address and encrypts your internet connection to protect privacy.
- 7. An affordable mini-computer for learning.
- 8. A security method that requires two forms of verification
Down
- 1. A software that lets you run different operating systems on the same computer.
- 2. The process of converting information into a code to stop unauthorized access.
- 3. A weakness in a system that can be exploited to gain unauthorized access.
- 4. Software that secretly monitors and collects data without the user's consent.
- 5. Attack where an intruder intercepts to spy on or alter an exchange.
- 6. An attack method that tries all possible combinations to guess a password or encryption key.