Across
- 3. Short for malicious software, it refers to any software designed to harm or exploit computer systems
- 5. The process of converting plain text or data into an unreadable form (ciphertext) to prevent unauthorized access, ensuring confidentiality and data security.
- 7. Type of cyber attack that uses voice and telephony technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
- 8. A network security device or software that monitors and controls incoming and outgoing network traffic, acting as a barrier between trusted internal networks and untrusted external networks.
Down
- 1. The practice of deceiving, pressuring or manipulating people into sending information or assets to the wrong people.
- 2. A programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism.
- 4. Wireless networking technology that uses radio waves to provide wireless high-speed Internet access.
- 6. A word, phrase, or string of characters intended to differentiate an authorized user or process (for the purpose of permitting access) from an unauthorized user
