Across
- 4. A software update that fixes security flaws
- 5. Worn to identify employees and grant access
- 7. Cameras or monitoring systems for physical security
- 8. A secure tunnel for your internet traffic
- 11. A login method that uses a password and a code
- 13. Verifying your identity before granting access
- 15. A security measure to restrict movement during a threat
- 16. Software that detects and removes harmful programs
Down
- 1. A secret word or phrase used to access something
- 2. When unauthorized access to data occurs
- 3. Software designed to harm or exploit a system
- 6. Scrambles data so only authorized users can read it
- 9. Uses fingerprints or facial recognition for access
- 10. A fake email that tricks you into giving up personal info
- 12. A digital barrier that blocks unauthorized access
- 14. Engineering Tricking people into revealing confidential information
