Across
- 3. A type of attack that floods a network or server with excess traffic
- 5. The process of converting data into unreadable format to prevent unauthorized access
- 10. The practice of preventing systems from digital attacks
- 11. A technique used to trick someone to reveal sensitive information
Down
- 1. A unique string of characters used for authentication
- 2. Software designed to block unauthorized access
- 4. A technique used to gain unauthorized access to a system by guessing passwords
- 6. A secret code that must be entered to enter a system or account
- 7. A malicious program that self replicates and spreads to other systems
- 8. Unauthorized access to data or systems
- 9. A deceptive email scam targeting personal information