Cybersecurity

1234567
Across
  1. 3. Weakness that can be exploited
  2. 5. Verifies user or system identity.
  3. 7. Scrambles data securely.
Down
  1. 1. Network security system that controls traffic.
  2. 2. Protects systems from attacks.
  3. 4. Fraudulent emails to steal information.
  4. 6. Malicious software that disrupts.