Across
- 7. This prevention method protects accounts by asking for something only the user would know.
- 12. This threat is when a server is overloaded with requests to disrupt services.
- 13. This threat is when someone is manipulated into giving data
- 14. This prevention method gets someone to break into the system to find flaws.
- 15. This threat uses malicious software to disrupt computer systems.
Down
- 1. This prevention method scans files and removes any malware from your computer.
- 2. This threat happens when someone watches someone enter personal data.
- 3. This prevention method scrambles data that is sent between devices.
- 4. This prevention method monitors network traffic.
- 5. This prevention method details which users have access to which files.
- 6. This threat is when a password is repeatedly guessed.
- 8. This threat is when code is entered into web forms to access data behind them.
- 9. This prevention method checks if data entered is valid before accepting it.
- 10. This prevention method protects the building where the data is stored.
- 11. This threat is when someone intercepts data between two devices.
