Cybersecurity

123456789
Across
  1. 4. This method scrambles data so that only authorized people can read it
  2. 5. the practice of keeping computer systems safe
  3. 8. a hacker sneaks in between two people who are communicating
  4. 9. acts like a barrier between your computer and the internet
Down
  1. 1. harmful software that can damage your computer
  2. 2. Software detect and remove harmful software
  3. 3. attackers send fake emails
  4. 6. uses malware to lock your files so you can’t access them
  5. 7. Injection when attackers take advantage of weaknesses in websites