internet privacy

12345678
Across
  1. 4. Private Network encrypts traffic between devices and the internetand protects sensitive data. Users can bypass geographic restrictions as internet traffic is routed.
  2. 5. This is an individual who gains unauthorized access and exploits weaknesses in the information.
  3. 7. Loading the data into unreadable format by applying an algorithm
  4. 8. It is the identity verification before granting access. Authentication enhances the security and privacy of systems. Common methods include passwords, biometrics (fingerprints or facial recognition), and security tokens. Most widely use Multi-factor authentication (MFA) enhances security by requiring more than one form of verification.
Down
  1. 1. a hidden way of bypassing normal authentication or encryption in a system. It is an illegal way to gain unauthorized access by bypassing the standard security methods. Backdoors can be installed by malware or intentionally left for debugging. It can control the system remotely and poses risks to data.
  2. 2. The monitoring of incoming and outgoing traffic based on security rules that already had been determined. The system is a barrier between trusted and untrusted networks. it is based on both hardware and software, which analyzes data packets if they should be allowed or blocked. The sensitive information is secured.
  3. 3. A broad category 9 of malicious software to damage computer systems.
  4. 6. tool that maintains the security of digital devices. It is designed to detect and remove malicious software like viruses