Across
- 2. An attempt to trick individuals into providing sensitive information, such as usernames, passwords, or credit card details, by posing as a trustworthy entity.
- 6. A secret combination of characters used for user authentication and access to secured information.
- 8. Measures taken to protect systems, networks, and data from unauthorized access, attacks, or damage.
- 9. The process of copying data or files from a remote server or website to a user's device.
- 10. A notification or warning about a potential threat, danger, or important event that requires immediate attention.
Down
- 1. The right of individuals to keep their personal information and activities confidential and protected from unauthorized disclosure.
- 3. A malicious software that can replicate itself and spread to other computers.
- 4. Unauthorized access to computer systems or networks with the intention of gathering, altering, or destroying data.
- 5. A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 7. A fraudulent scheme performed by a deceitful individual, group, or company to gain money or something else of value.
- 8. Software that secretly gathers information about a user's activities without their knowledge and sends it to a third party.
