Across
- 2. Common type of cyberattack where the hacker encrypts your files and demands payment.
- 5. A ____ test is performed to identify vulnerabilities in a system.
- 7. This form of attack tries to trick you into giving personal information via fake websites or emails.
- 8. A phishing attack done over the phone.
- 13. The process of verifying someone's identity.
- 14. A strong, complex one helps protect your accounts.
Down
- 1. A person who attempts to gain unauthorized access to your system.
- 3. A type of phishing attack done over text messages.
- 4. A software that fights off malicious viruses and malware.
- 6. The backbone of secure communication online, abbreviated as SSL.
- 9. Protection against unauthorized changes to data.
- 10. Multi-Factor Authentication is shortened to this.
- 11. A harmful program disguised as legitimate software.
- 12. A malicious code that spreads from computer to computer.