Across
- 1. What is a network security device that monitors and filters incoming and outgoing traffic
- 3. What is a short code sent to confirm your identity when logging in
- 5. What is the unique address of a device on the internet
- 7. What type of software is designed to detect and remove malicious programs
- 8. What is a malicious software that locks users out of their data until a ransom is paid
- 11. What is a secret combination of characters used to access a system
- 13. What is a program that secretly records what you type
- 14. What is a small file that websites store on your computer to remember information
- 15. What is a security flaw that hackers use before it gets fixed
Down
- 2. What is the practice of verifying a user’s identity before granting access
- 4. What is the act of attempting to gain sensitive information by pretending to be a trustworthy entity
- 6. What is the process of converting data into a coded format to prevent unauthorized access
- 9. What is a password system that protects Wi-Fi
- 10. What is an attack where hackers overload a website with too much traffic
- 12. What is the process of making regular copies of data to prevent loss
