Across
- 5. An unauthorized access event
- 7. A security feature that restricts access based on user identity
- 9. The act of disguising communication from an unknown source as trustworthy
- 10. A type of attack pretending to be someone else to steal data
- 11. A security process that requires atleast two forms of authentication to access a network
Down
- 1. A flaw in the application or system that can be exploited to gain unauthorized access
- 2. a way of scrambling data so that only authorized parties can understand the information
- 3. A malicious program that replicates itself
- 4. A type of attack that manipulates people into giving away confidential information
- 6. A type of malware that demands ransom
- 8. Protection against web-based threats
