Cyber Security Awareness (1)

12345
Across
  1. 4. Fraudulent communications that appear to come from a legitimate and reputable source, usually through email and text messaging
  2. 5. Network security device that separates a trusted internal network from an external network deemed untrustworthy, such as the internet
Down
  1. 1. Type of malware that prevents users from accessing their devices or files, and demands payment to restore access
  2. 2. Ensures that only genuine, authorized users can access online accounts, keeping bad actors out
  3. 3. A new, improved, or fixed version of software that addresses security vulnerabilities