Across
- 2. Сombining several means of presenting information in one system.
- 4. Preventing unauthorized access; safety.
- 5. List of objects that are under suspicion regarding security.
- 7. Bait net; trap network.
- 8. Technical devices.
- 10. Data interception.
- 16. Unauthorized entry into the system bypassing its protection.
- 18. Security of information.
- 20. Computer program.
- 23. The user's secret password to unlock the phone/smartphone.
- 25. The process of rewriting or deletion information.
- 26. Identification of intruders or threats.
- 27. Type of malware.
- 28. Avoiding bad events.
- 29. Disclosure of information.
Down
- 1. Proof.
- 3. Encoding of information.
- 6. A set of tools that allows the user to interact with the program.
- 9. Computer attacker.
- 11. Security of information.
- 12. The weakest link in computer security.
- 13. A crime involving a computer or computer network.
- 14. The amount of potential damage.
- 15. Bad event.
- 17. Masking an intruder or malware.
- 19. Secret character set.
- 21. System user.
- 22. User, trying to gain unauthorized access to a computer system.
- 24. Effort to penetration into the system.
- 25. Organized collection of structured information.
