Cybersecurity Awareness Month

123456789
Across
  1. 5. The practice of accessing a computer or network without authorization.
  2. 6. Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
  3. 7. A technique used to verify the identity of a user by requiring two different forms of authentication.
  4. 9. A unique string of characters used to authenticate a user's identity.
Down
  1. 1. A program designed to prevent unauthorized access to or from a private network.
  2. 2. Malicious software designed to gain unauthorized access to a computer system.
  3. 3. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
  4. 4. A piece of software designed to block access to a computer system until a sum of money is paid.
  5. 8. A method of protecting sensitive data by converting it into an unreadable format.