Queenbee Cybersecurity

1234567
Across
  1. 4. An hacker sends a ___________ email requesting the victim for sensitive information
  2. 5. A _________ access by a third party is called a cyber attack
  3. 7. Trojan is an example of __________ attack
Down
  1. 1. Users need to use unique __________ passwords to strengthen defence against attacks
  2. 2. ________ are dummy computers systems to deceive attackers
  3. 3. A virtual wall between the computer and the internet is called as _______
  4. 6. A person who performs a cybersecurity attack is called a _______