Network Security & Protection

123456789101112131415161718192021
Across
  1. 4. Unique mark indicating authenticity or approval.
  2. 6. Assurance that a party cannot deny their actions.
  3. 8. Temporary credential for secure access.
  4. 10. Reverting encrypted data back to its original form.
  5. 11. Verifying user identity or access rights.
  6. 13. Malicious software that secretly monitors user activity.
  7. 14. Fraudulent attempts to obtain sensitive information online.
  8. 15. Analyzing patterns in user actions for security.
  9. 16. Converting data into a secure format.
  10. 18. Luring victims with false promises or goods.
  11. 19. Ensuring data remains accurate and unaltered.
  12. 20. Software designed to detect and eliminate malware.
  13. 21. Decentralized ledger technology for secure transactions.
Down
  1. 1. Encrypted data that is unreadable without decryption.
  2. 2. Readable data before encryption.
  3. 3. Identifying individuals or objects based on characteristics.
  4. 5. Secretly listening to private communications or data.
  5. 7. Software that displays unwanted advertisements on devices.
  6. 9. Unauthorized access to computer systems or networks.
  7. 12. Malware that encrypts files for ransom payment.
  8. 14. Secret word or phrase for user authentication.
  9. 15. Identifying individuals using biological traits.
  10. 17. Protecting personal information from unauthorized access.