Across
- 6. A type of malware that locks files until a ransom is paid
- 9. An attack that floods a system with traffic to make it unavailable
- 11. A scam where attackers impersonate a trusted entity to steal sensitive information
- 13. Verifying the identity of a user or system
- 14. A security system that monitors and controls network traffic
- 17. A security process requiring two forms of verification to access an account
- 19. A tool to store and generate secure passwords
- 20. Software that secretly gathers user information without consent
Down
- 1. An incident where data is altered without authorization
- 2. A key used in encryption to secure communications that can be shared openly
- 3. The process of converting information into a secure format to prevent unauthorized access
- 4. Ensuring information is not accessed by unauthorized parties
- 5. Practices designed to protect computers, networks, and data from attacks
- 7. Ensuring information remains accurate and trustworthy
- 8. Ensuring authorized users have access to information when needed
- 10. Manipulating people to give up confidential information
- 12. Harassment or bullying that occurs through digital platforms
- 15. Malicious software designed to harm or exploit computers
- 16. An incident where sensitive data is accessed without authorization
- 18. A key used in encryption that must remain confidential
