Preventive Technology

1234567891011
Across
  1. 1. Secret combination of characters used to authenticate a user's identity.
  2. 2. Process of converting data into a code to prevent unauthorized access.
  3. 5. Self-replicating program that infects computer systems and can cause harm.
  4. 6. Malicious software designed to damage or gain unauthorized access to a computer system.
  5. 8. Deliberate and malicious attempt to compromise a computer system or network.
  6. 9. Software update designed to fix vulnerabilities or bugs in a program.
  7. 10. Security system that monitors and controls incoming and outgoing network traffic.
  8. 11. Process of verifying the identity of a user or device accessing a system.
Down
  1. 1. Cyber attack where individuals are tricked into revealing sensitive information through deceptive emails or websites.
  2. 3. Weakness or flaw in a system that can be exploited by attackers.
  3. 4. breach: Unauthorized access or exposure of sensitive or confidential information.
  4. 7. Unauthorized access or breach of a computer system or network.