Across
- 3. Applying updates to software to fix vulnerabilities
- 6. Process of verifying the identity of a user or device
- 9. Malicious software that locks data and demands payment for release.
Down
- 1. Manipulating people into revealing confidential information
- 2. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- 3. Secret string of characters used for authentication
- 4. Process of converting data into a coded form to prevent unauthorized access
- 5. Software designed to disrupt, damage, or gain unauthorized access to a system
- 7. Secure tunnel for online communication, often used for privacy
- 8. Network security system that monitors and controls incoming and outgoing traffic
