Cyber Security Awareness Month

12345678910
Across
  1. 3. Software designed to detect and remove malware
  2. 5. A form of malware that demands payment to restore access to data
  3. 7. Malicious software that secretly monitors and collects personal information from a user’s device
  4. 8. The practice of keeping personal and sensitive information secure from unauthorized access or disclosure
  5. 9. The process of converting information into a secret code
Down
  1. 1. A method of verifying a user’s identity using something they know, have, or are
  2. 2. A software flaw that can be exploited by attackers
  3. 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
  4. 6. A string of characters used to verify your identity online
  5. 10. A scam where attackers trick you into giving personal information