Cybersecurity
Across
- 2. attempt to exploit vulnerabilities
- 4. spread by phishing
- 6. malicious violator
- 7. malicious software
- 8. unauthorized act
- 11. secure string of characters
- 14. software that monitors online activity
- 15. hardware/software to prevent unauthorized access
- 17. scam without a rod and reel
- 18. recognizable pattern
Down
- 1. software to fix vulnerabilities
- 3. being unprotected
- 5. secure entry
- 9. vulnerability
- 10. the use of fake addresses
- 12. process of verifying identity
- 13. enticed by an incentive
- 16. a virus or device that captures data