Across
- 4. who tests systems for security vulnerabilities, often ethically. (9 letters) A type of encryption where the same key is used for both encryption and decryption. (10 letters)
- 5. of ensuring only authorized users can access systems or data. (6 letters)
- 6. of rules for managing and securing networks and information systems. (7 letters)
- 9. of attack where attackers gain unauthorized access by pretending to be a trustworthy entity. (6 letters)
Down
- 1. designed to detect and remove viruses and other malicious software. (8 letters)
- 2. of malicious software that replicates itself and spreads to other computers. (7 letters)
- 3. of converting data into a code to prevent unauthorized access. (10 letters)
- 7. of attack where sensitive information is stolen by intercepting communication. (11 letters)
- 8. where a hacker floods a network with excessive data to overwhelm it. (3 letters)
