Cybersecurity

12345678910
Across
  1. 2. A person who gains unauthorized access to systems
  2. 5. Malicious software
  3. 7. Method used to convert data into unreadable format
  4. 9. Unauthorized attempt to access data or systems
  5. 10. Keeping software up to date (two words, no space)
Down
  1. 1. A secret word or phrase used to authenticate
  2. 3. Security method requiring two forms of verification (abbr.)
  3. 4. Virtual barrier separating internal network from external access
  4. 6. Software used to detect and remove malware
  5. 8. Common social engineering attack using fake emails