henry morris ict

1234567891011
Across
  1. 3. process of converting data into an unreadable format to protect it from unauthorized access
  2. 4. process of sharing a mobile device's internet connection with other devices, such as laptops or tablets
  3. 5. testing
  4. 8. horse
  5. 9. hat hacker
  6. 11. with malicious intentions who gain unauthorized access to computer networks and systems
Down
  1. 1. where malicious actors send deceptive messages—typically via email, social media, or text
  2. 2. of malware that disguises itself as a legitimate program to trick users into installing it, allowing unauthorized access to their systems.
  3. 4. factor authentication
  4. 6. a cyberattack that redirects users from legitimate websites to fake ones, often without their knowledge
  5. 7. security by requiring two distinct forms of identity verification before granting access to an account or service
  6. 10. a security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system