Across
- 3. A technique to deceive individuals into providing sensitive information.
- 5. Software used to protect against viruses and malware.
- 7. A sequence of characters used to authenticate identity or access.
- 9. A program that replicates itself and spreads to other computers.
- 10. An encrypted connection between a web browser and a server.
Down
- 1. The practice of keeping software up to date to protect against vulnerabilities.
- 2. A system that verifies a user's identity through a unique physical characteristic.
- 4. A secret code that only authorized parties should be able to read.
- 6. A type of attack that floods a network to disrupt its operation.
- 8. An organization that identifies security flaws in software.