cybersecurity Kader

12345678
Across
  1. 2. A person who uses computers to gain unauthorized access to data
  2. 5. A network security device that monitors traffic and blocks unauthorized access
  3. 7. A software error or flaw that can be exploited by hackers
  4. 8. A temporary code or object used to verify your identity
Down
  1. 1. A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in an email.
  2. 3. Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system
  3. 4. A type of malware that locks your files and demands payment to release them
  4. 6. The process of scrambling data so it becomes unreadable without a specific key