Cybersecurity crossword

12345678
Across
  1. 3. A secure network that hides your IP address and encrypts your internet connection to protect privacy.
  2. 7. An affordable mini-computer for learning.
  3. 8. A security method that requires two forms of verification
Down
  1. 1. A software that lets you run different operating systems on the same computer.
  2. 2. The process of converting information into a code to stop unauthorized access.
  3. 3. A weakness in a system that can be exploited to gain unauthorized access.
  4. 4. Software that secretly monitors and collects data without the user's consent.
  5. 5. Attack where an intruder intercepts to spy on or alter an exchange.
  6. 6. An attack method that tries all possible combinations to guess a password or encryption key.