Across
- 1. Secret combination of characters used to authenticate a user's identity.
- 2. Process of converting data into a code to prevent unauthorized access.
- 5. Self-replicating program that infects computer systems and can cause harm.
- 6. Malicious software designed to damage or gain unauthorized access to a computer system.
- 8. Deliberate and malicious attempt to compromise a computer system or network.
- 9. Software update designed to fix vulnerabilities or bugs in a program.
- 10. Security system that monitors and controls incoming and outgoing network traffic.
- 11. Process of verifying the identity of a user or device accessing a system.
Down
- 1. Cyber attack where individuals are tricked into revealing sensitive information through deceptive emails or websites.
- 3. Weakness or flaw in a system that can be exploited by attackers.
- 4. breach: Unauthorized access or exposure of sensitive or confidential information.
- 7. Unauthorized access or breach of a computer system or network.
