Cyber Security Cross Word
Across
- 3. Scrambling data so only the right person can read it (10 letters)
- 8. Blocks unwanted access to or from a network (8 letters)
- 9. A weakness in a system a threat actor can take advantage of (13 letters)
Down
- 1. Tool used to hide your internet activity (3 letters)
- 2. A formal set of rules or guidelines for maintaining security (6 letters)
- 4. Fake emails that trick you into giving personal info (9 letters)
- 5. Software that blocks computer viruses (9 letters)
- 6. A term for harmful software (7 letters)
- 7. A type of malware that can be attached to a legitimate file. (5 letters)