Security

123456789101112
Across
  1. 3. Process of verifying the identity of a user
  2. 4. Unauthorized access to data or systems
  3. 5. A secret code used for authentication
  4. 9. Technique of hiding data within another file
  5. 10. Defense system that monitors and controls incoming and outgoing network traffic
  6. 12. Digital mark that ensures the integrity of a document
Down
  1. 1. Malicious software that spreads and damages computer systems
  2. 2. A technique to deceive attackers by providing false information
  3. 6. Practice of protecting sensitive information by destroying it
  4. 7. Deliberately tricking someone into revealing confidential information
  5. 8. Person responsible for identifying and fixing security vulnerabilities
  6. 9. Protection against unauthorized access
  7. 11. Process of converting readable data into unreadable format