Across
- 3. Software used to protect against viruses and malware.
- 4. A program that replicates itself and spreads to other computers.
- 7. An organization that identifies security flaws in software.
- 8. An encrypted connection between a web browser and a server.
- 9. A technique to deceive individuals into providing sensitive information.
- 10. A type of attack that floods a network to disrupt its operation.
Down
- 1. A system that verifies a user's identity through a unique physical characteristic.
- 2. A secret code that only authorized parties should be able to read.
- 5. The practice of keeping software up to date to protect against vulnerabilities.
- 6. A sequence of characters used to authenticate identity or access.