Cybersecurity

1234567891011
Across
  1. 5. This malicious software holds your data hostage until a ransom is paid
  2. 6. The process of verifying a user's identity
  3. 8. A deceptive email attempt to steal personal information
  4. 9. Malicious software designed to harm a computer system
  5. 10. Scrambling data to make it unreadable without a key
  6. 11. Process of identifying and correcting security vulnerabilities in a
Down
  1. 1. A security incident where sensitive data is exposed
  2. 2. Software program designed to block unauthorized access while
  3. 3. An attack that overwhelms a server with traffic, making it unavailable
  4. 4. Software that scans for and neutralizes viruses and other malicious
  5. 7. system.
  6. 8. authorized communications.