Across
- 3. is a malware aimed to corrupt or modify data on one computer before spreading to others.
- 4. a sequence of letters, characters, and numbers used for authentication
- 7. is a technique used in order to manipulate and deceive people into handing over sensitive information.
- 8. is a network device that determines what information is able to enter a system based on the rules in place.
- 9. a technique to obtain sensitive information typically through text messaging
- 10. is the process of encoding data so that it can only be accessed by its intended recipient.
- 12. the state of being exposed to the possibility of being attacked
- 13. is a method of attacking a computer by alternating a program while making it appear to function normally
Down
- 1. are the measures taken in order to protect systems and their data.
- 2. is a network that uses encryption in order to in order to maintain privacy.
- 4. a technique to obtain sensitive information typically through email.
- 5. a form of malware that takes control of data and holds it hostage until a ransom is paid.
- 6. is short for malicious software, and is any intrusive software developed to wreak havoc on systems.
- 11. a sequence of words used for authentication.
- 12. is the act of confirmation through evidence of somethings validity.