Across
- 3. A type of attack where an attacker pretends to be a trusted entity
- 6. A process of converting data into a code to prevent unauthorized access
- 7. A legal framework that protects personal data in the European Union
- 9. A weakness in a system that can be exploited by attackers
- 10. A method of verifying someone's identity using two forms of verification
- 11. A secure method of transmitting data over the internet
- 13. A person who attempts to gain unauthorized access to systems or data
- 14. A type of software update designed to fix security vulnerabilities
- 16. A type of malware that encrypts files and demands payment for decryption
- 18. A type of attack where an attacker inserts malicious code into a legitimate website
Down
- 1. A type of attack where hackers trick individuals into revealing sensitive information
- 2. A legal requirement to protect sensitive customer information
- 4. A policy that ensures data is accessible only to authorized users
- 5. A process of regularly backing up data to prevent loss
- 8. A type of security breach where data is accessed without authorization
- 12. A method of disguising communication to hide its content
- 15. The practice of protecting systems, networks, and data from digital attacks
- 17. A type of software designed to detect and remove malicious programs
- 18. A type of attack that floods a network with traffic to disrupt service
