Cyber Security Month

123456
Across
  1. 2. Malicious software that demands a ransom
  2. 6. Protection against unauthorized access
Down
  1. 1. set of rules governing the exchange or transmission of data in a computer network
  2. 3. Verifying the identity of a user or system
  3. 4. Trickery to obtain sensitive information
  4. 5. technique that involves deciphering a code or encryption system