Across
- 2. A network security system that monitors and controls incoming and outgoing traffic
- 4. A type of cyber attack that tricks users into revealing personal information
- 6. The principle of ensuring data is not altered or tampered with
- 9. A software update that fixes security vulnerabilities
- 11. Malware that locks data and demands payment for release
- 12. A file or program that appears harmless but contains malicious code
- 13. Software designed to disrupt, damage, or gain unauthorized access
- 15. The process of converting data into a coded form to prevent unauthorized access
Down
- 1. The practice of hiding messages so only the intended recipient can read them
- 3. Software that secretly gathers user information
- 5. A person who gains unauthorized access to systems for malicious purposes
- 7. An extra layer of security requiring two forms of identification
- 8. A secret word or phrase used to gain access
- 10. A fake website or email designed to look legitimate
- 14. A service that encrypts your internet connection for privacy
