Cyber Marathon

1234567
Across
  1. 1. A set of rules and configurations that control network traffic to enhance security
  2. 3. A technique to disguise a message or data to make it unreadable without the proper decryption key
  3. 5. A program designed to infect and spread across computer systems
  4. 6. The practice of tricking individuals into revealing sensitive information through deceptive emails
  5. 7. A unique string of characters that verifies a user's identity, often used for two-factor authentication
Down
  1. 2. A type of malware that encrypts a user's files and demands a ransom for their release
  2. 4. The process of guessing passwords to gain unauthorized access