Cybersecurity Puzzle
Across
- 2. Unauthorized access to or manipulation of a computer system or network
- 4. A secret word or phrase used to gain access to a system.
- 6. The practice of protecting systems, networks, and programs from digital attacks
- 7. A digital certificate used to encrypt and authenticate a website
- 9. A type of software designed to harm or exploit any programmable device.
Down
- 1. The act of pretending to be someone else to gain sensitive information
- 3. A type of malicious software that demands ransom
- 5. An attack that floods a network with excessive traffic, disrupting service
- 8. Unwanted email that often contains malware or phishing attempts
- 10. Software designed to detect and remove malicious software