Across
- 2. The process of converting information or data into a code to prevent unauthorized access.
- 5. The process of verifying the identity of a user, device, or system.
- 9. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication.
- 10. The process of taking encoded or sealed data and turning it back into a format that you or the computer can read.
- 11. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- 1. A weakness or flaw in a system’s security that could be exploited by a threat.
- 3. A network of private computers infected with malicious software and controlled as a group without the owners' knowledge.
- 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
- 6. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- 7. Software used to prevent, scan, detect, and delete viruses from a computer.
- 8. A service that creates a safe, encrypted connection over a less secure network, such as the internet.
