cyber security crossword puzzle

123456789
Across
  1. 5. A security method that requires two different forms of verification to log in.
  2. 6. A person who illegally gains access to computer systems.
  3. 8. A deceptive method used to trick users into revealing personal information through fake emails or websites.
  4. 9. The process of verifying a user’s identity before granting access.
Down
  1. 1. Harmful software designed to damage or disrupt computer systems.
  2. 2. A malicious program that spreads and infects other files or systems.
  3. 3. The protection of personal and sensitive information from misuse.
  4. 4. The process of converting information into secure code to protect it from unauthorized access.
  5. 7. A security system that monitors and blocks unauthorized network access.
  6. 8. A secret combination of characters used to access an account.