Network Security

12345678910
Across
  1. 3. It is used to describe a hidden method of bypassing security to gain access to a restricted part of a computer system.
  2. 5. It is slang commonly used to describe junk e-mail on the Internet.
  3. 6. It is a process that ensures and confirms a user’s identity
  4. 8. It is a malware computer program that replicates itself in order to spread to other computers.
  5. 9. It is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
  6. 10. It is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet
Down
  1. 1. These are small files which are stored on a user’s computer. It provide a way for the website to recognize you and keep track of your preferences
  2. 2. These refers to any video in which faces have been either swapped or digitally altered, with the help of AI
  3. 3. It is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by a common type of malware
  4. 4. It refers to a flaw in a system that can leave it open to attack.
  5. 7. It refers to any piece of software or application that displays advertisements on your computer.