Cybersecurity Vocabulary

12345678
Across
  1. 4. verifiying that the user is who they say they are
  2. 6. spying on a user to get their login information
  3. 8. sending targeted emails pretending to be a known person to gain information or give malware
Down
  1. 1. Protection of computer systems and networks from attack
  2. 2. requires the user to provide two or more verification factors to gain access
  3. 3. a hacking method that uses trial and error to crack passwords
  4. 5. sending emails that pretend to be real in order to gain information or give malware
  5. 7. helps you identify vulnerabilities and create countermeasures against attacks