Across
- 3. process of converting data into an unreadable format to protect it from unauthorized access
- 4. process of sharing a mobile device's internet connection with other devices, such as laptops or tablets
- 5. testing
- 8. horse
- 9. hat hacker
- 11. with malicious intentions who gain unauthorized access to computer networks and systems
Down
- 1. where malicious actors send deceptive messages—typically via email, social media, or text
- 2. of malware that disguises itself as a legitimate program to trick users into installing it, allowing unauthorized access to their systems.
- 4. factor authentication
- 6. a cyberattack that redirects users from legitimate websites to fake ones, often without their knowledge
- 7. security by requiring two distinct forms of identity verification before granting access to an account or service
- 10. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system
