Cyber security 6-8

12345678910111213
Across
  1. 3. Fraudulent attempts to gain access to sensitive information, usually via email
  2. 5. Protects digital information
  3. 9. Software designed with malicious intent
  4. 10. A secret code to protect access
  5. 11. A technique used to take advantage of a vulnerability
  6. 12. When sensitive information is released
  7. 13. Software that locks users out of their system until payment is made
Down
  1. 1. Malicious software that targets computers
  2. 2. Software designed to spy on activity without the user's knowledge
  3. 4. Software update to fix vulnerabilities and bugs
  4. 6. Using two separate forms of authentication for secure access
  5. 7. Technology used to monitor the outflow of sensitive data
  6. 8. Network security system that prevents unwanted access