Cybersecurity

12345678
Across
  1. 2. A good practice for authorised users is to use unique ________ passwords
  2. 4. ____________ type of cyber attack aims to steal data from the computers
  3. 5. cybersecurity aims to secure _______ components from attackers
  4. 7. __________ is a person who attempts to get unauthorised access to the computer system
  5. 8. __________ is a virtual wall between the protected computer and the internet
Down
  1. 1. __________ are dummy computers that attract hackers to keep the remaining computers safe
  2. 2. _________ softwares must be used to protect computers against cyberattacks
  3. 3. Man in the __________ is a type of cyberattack where the communication line is intercepted
  4. 6. common type of attack which includes trojans and adwares