Across
- 1. A security protocol that provides secure communication over a network, often used for remote access
- 3. A type of authentication that verifies a user's identity based on physical characteristics
- 7. A security measure that restricts access based on the principle of least privilege
- 9. A cryptographic key that is kept secret and used for decrypting data
- 12. A protocol used to secure email communication
- 13. A program or device that identifies and authenticates a user's identity electronically
- 14. An attack that involves intercepting and altering communication between two parties
- 15. A method of encrypting data that uses a single key for both encryption and decryption
Down
- 2. The act of tricking individuals into revealing sensitive information
- 4. A type of attack that uses social engineering to manipulate individuals into taking specific actions
- 5. A type of malware that hides its presence and can perform malicious actions without user knowledge
- 6. A type of attack that floods a system with excessive traffic to disrupt normal operation
- 8. A security incident response plan to restore systems and operations after an attack
- 10. A technique used to ensure data integrity by creating a unique hash value for a file
- 11. Software used to detect and prevent unauthorized access to a computer network
