CYBERSECURITY AWARENESS - C40
Across
- 2. The process of analyzing systems for vulnerabilities (8 LETTERS)
- 5. A program that replicates itself to spread malware (4 LETTERS)
- 6. A security method where each user has specific privileges (6 LETTERS)
- 7. Cybercriminals often use this method to monitor network activity (8 LETTERS)
- 9. Using multiple types of information to verify identity (14 LETTERS)
- 10. Security strategy that requires users to change this regularly (8 LETTERS)
Down
- 1. Common method used to protect sensitive data (10 LETTERS)
- 2. Fake emails claiming to be from trusted sources (8 LETTERS)
- 3. A phrase longer than a password for added security (9 LETTERS)
- 4. Network of infected computers controlled remotely (6 LETTERS)
- 8. Program designed to prevent unauthorized access (8 LETTERS)