EQUATE - Mobile Security Risks Edition

12345678
Across
  1. 3. Short for malicious software, it refers to any software designed to harm or exploit computer systems
  2. 5. The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
  3. 7. Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
  4. 8. A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
  1. 1. The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
  2. 2. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
  3. 4. Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
  4. 6. A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user