Across
- 3. network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
- 4. process of converting information or data into a code to prevent unauthorized access.
- 5. type of malicious software designed to block access to a computer system until a sum of money is paid.
- 6. maximum rate of data transfer across a given path, measured in bits per second (bps).
- 7. method of grouping data that is transmitted over a digital network into packets, which are then sent independently and reassembled at the destination.
- 8. A service that encrypts your internet traffic and protects your online identity by creating a private network from a public internet connection.
- 9. A cybersecurity technology that monitors end-user devices to detect and respond to cyber threats.
Down
- 1. A security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity.
- 2. delay before a transfer of data begins following an instruction for its transfer, often measured in milliseconds (ms).
- 10. A method of trying to gather personal information using deceptive e-mails and websites.