Across
- 3. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
- 6. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
- 8. Verifying the identity of users or systems to ensure secure access.
- 10. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
- 1. Pertaining to the security challenges and measures for smartphones and tablets.
- 2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
- 4. Malware that encrypts files, demanding payment for their release.
- 5. An update to fix vulnerabilities or improve security in software or systems.
- 7. Converting data into a code to prevent unauthorized access, especially during transmission.
- 9. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.