Cyber Security Puzzle

12345678910
Across
  1. 3. Extra copies of computer files that can be used to restore files that are lost or damaged.
  2. 4. Attempting to trick people into revealing sensitive information often by using emails or fake websites that look like they are from trusted sources.
  3. 6. An unauthorized user who attempts to or gains access to an information system.
  4. 8. Software designed to block malware from entering protected networks.
  5. 9. A mechanism for creating a secure connection between a computing device and a computer network.
  6. 10. The protection of digital information, as well as the integrity of the infrastructure housing and transmitting digital information.
Down
  1. 1. A string of characters used to authenticate and identity.
  2. 2. A flaw or weakness in an information system that could be exploited.
  3. 5. part of internet that is not indexed by search engines.
  4. 7. A computer program that can block, detect and remove viruses and other malware.