Across
- 3. A type of attack where hackers trick individuals into revealing sensitive information
- 4. The practice of protecting systems, networks, and data from digital attacks
- 6. Ensuring that data is accurate and reliable
- 9. A type of attack that floods a network with traffic to disrupt service
- 12. A type of security breach where data is accessed without authorization
- 14. A legal requirement to protect sensitive customer information
- 15. A method of disguising communication to hide its content
- 16. A process of converting data into a code to prevent unauthorized access
- 18. A type of attack where an attacker pretends to be a trusted entity
- 19. A type of software designed to detect and remove malicious programs
- 21. A method of verifying someone's identity using two forms of verification
Down
- 1. Protecting sensitive information from unauthorized access
- 2. A type of software update designed to fix security vulnerabilities
- 5. Ensuring that systems and data are accessible when needed
- 7. the use of technologies, policies, and controls to protect data, applications, and infrastructure in cloud environments
- 8. A weakness in a system that can be exploited by attackers
- 10. A process of regularly backing up data to prevent loss
- 11. A legal framework that protects personal data in the European Union
- 13. A person who attempts to gain unauthorized access to systems or data
- 17. A type of malware that encrypts files and demands payment for decryption
- 20. A secure method of transmitting data over the internet
