Cybersecurity Puzzle

12345678910
Across
  1. 2. Unauthorized access to or manipulation of a computer system or network
  2. 4. A secret word or phrase used to gain access to a system.
  3. 6. The practice of protecting systems, networks, and programs from digital attacks
  4. 7. A digital certificate used to encrypt and authenticate a website
  5. 9. A type of software designed to harm or exploit any programmable device.
Down
  1. 1. The act of pretending to be someone else to gain sensitive information
  2. 3. A type of malicious software that demands ransom
  3. 5. An attack that floods a network with excessive traffic, disrupting service
  4. 8. Unwanted email that often contains malware or phishing attempts
  5. 10. Software designed to detect and remove malicious software