cybersecurity

12345678910
Across
  1. 1. What do you call the set of secret characters used to access accounts and secure information?
  2. 5. What is malicious software that disguises itself as legitimate software?
  3. 6. What is the term for a digital attack in which hackers demand payment to unlock encrypted files?
  4. 7. What is a deceptive email that tricks users into giving sensitive information?
  5. 10. What is the practice of protecting systems, networks, and programs from digital attacks?
Down
  1. 2. What is the process of verifying the identity of a user before granting access to a system?
  2. 3. What type of attack overwhelms a system with traffic, causing it to crash?
  3. 4. What do you call a software program that replicates itself and spreads to other computers?
  4. 8. What is the act of attempting to gain unauthorized access to a computer or network?
  5. 9. What is a tool that filters incoming and outgoing network traffic to secure a network?