Across
- 3. Unethical practice of gaining unauthorized access to computer systems.
- 5. Act of impersonating a legitimate entity to deceive individuals or gain access.
- 6. A type of computer memory.
- 9. A small portable computer.
Down
- 1. Securing computer systems against unauthorized access.
- 2. A popular operating system.
- 3. The brain of a computer.
- 4. Term for gaining access to a secure network through.
- 7. Malicious software used to gain unauthorised access to computer systems.
- 8. Desired outcomes.