Cyber Security Puzzle
Across
- 3. The process of verifying the identity of a user
- 4. A method of disguising data to protect it
- 6. A device that helps protect networks by filtering traffic
- 8. A breach where sensitive data is accessed unlawfully
- 9. A malicious email designed to trick recipients
- 11. A protocol used to send emails securely
Down
- 1. A common form of malware that locks files
- 2. A program that scans for vulnerabilities in systems
- 5. A common cybersecurity measure that involves using complex passwords
- 7. Software that detects and removes malware
- 8. A type of attack where multiple systems are used to overwhelm a target
- 10. A legal framework for data protection in the EU