Information Security

123456
Across
  1. 1. A program that appears legitimate but actually contains malicious code
  2. 4. The process of identifying and fixing security vulnerabilities.
  3. 5. A malicious software that encrypts data and demands a ransom
  4. 6. A technique for verifying the identity of users or devices
Down
  1. 2. The act of browsing the internet without revealing your identity.
  2. 3. Unauthorized access to computer systems or data
  3. 4. A unique combination of characters used to access a system