Cyber security 6-8
Across
- 3. Fraudulent attempts to gain access to sensitive information, usually via email
- 5. Protects digital information
- 9. Software designed with malicious intent
- 10. A secret code to protect access
- 11. A technique used to take advantage of a vulnerability
- 12. When sensitive information is released
- 13. Software that locks users out of their system until payment is made
Down
- 1. Malicious software that targets computers
- 2. Software designed to spy on activity without the user's knowledge
- 4. Software update to fix vulnerabilities and bugs
- 6. Using two separate forms of authentication for secure access
- 7. Technology used to monitor the outflow of sensitive data
- 8. Network security system that prevents unwanted access