Chapter 1

12345678910
Across
  1. 2. Masquerades as legitimate communications Common via email, text, social media
  2. 6. First line of defense
  3. 8. Data protection in cloud storage
  4. 9. The practice of protecting systems, networks, and programs from digital attacks
  5. 10. Malicious software designed to harm systems
Down
  1. 1. Encrypts victim's files Demands payment for decryption
  2. 3. A cybersecurity best practice. Makes it difficult for hackers to crack the user's password
  3. 4. ransomware attack on a critical US energy infrastructure. Threatened distribution of gas and jet fuel
  4. 5. type of hacking method that involves hacker cracking user's password
  5. 7. type of malware