Cyber Puzzle

12345678910
Across
  1. 1. Special virus that moves from computer to computer without human interaction.
  2. 8. An important process that verifies a user is really who they are; many different ways this can be done.
  3. 10. unique address that identifies a device on the internet or a local network.
Down
  1. 2. The form of encryption that requires a single key
  2. 3. A social engineering technique that uses emails to impersonate others and gain access to unauthorised information.
  3. 4. means that data is protected from unauthorized changes to ensure that it is reliable and correct.
  4. 5. The coloured hat of hackers that are cybercriminals who uses hacking for malicious intent and personal gain
  5. 6. a person who uses computers to gain unauthorized access to data.
  6. 7. the primary purpose of _________ is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet.
  7. 9. An ________ is a program or code that makes use of the vulnerability in an application or system.