Across
- 4. A malicious program designed to gather information about the user or their system.
- 7. A standard way of providing authentication.
- 8. Software to control data going in and out of a network.
- 9. A malicious program designed to damage a computer system.
- 10. An activity performed by an ethical hacker to test a network's security. (2 words)
- 12. A person who is employed by companies to try to break their network security. (2 words)
- 13. Authentication system that requires more than one item to log in. (2 words)
- 14. Proving your identity.
Down
- 1. Protection of systems against theft, vandalism, etc. (2 words)
- 2. Sending an email pretending to be from a bank, etc.
- 3. A method of breaching security by tricking people. (2 words)
- 5. A document that defines what users are (not) permitted to do on a system. (2 words)
- 6. Ensuring data is within an acceptable range and format.
- 11. An update to software to fix bugs - especially security bugs.
