Cybersecurity

12345678910
Across
  1. 2. A scam to steal information through fake communication
  2. 4. A copy of data stored for recovery in case of loss
  3. 8. Malicious software that secretly tracks your online activity and steals personal information
  4. 9. A malicious program that replicates itself and spreads to other systems
  5. 10. A security method requiring two or more ways to verify your identity before granting access
Down
  1. 1. Malware that demands payment to restore access to data or systems
  2. 3. A software update to fix vulnerabilities
  3. 5. A secret key to access your account
  4. 6. Someone who gains unauthorized access to systems or networks
  5. 7. The right to control your personal information and keep it protected from unauthorized access.