Across
- 2. Masquerades as legitimate communications Common via email, text, social media
- 6. First line of defense
- 8. Data protection in cloud storage
- 9. The practice of protecting systems, networks, and programs from digital attacks
- 10. Malicious software designed to harm systems
Down
- 1. Encrypts victim's files Demands payment for decryption
- 3. A cybersecurity best practice. Makes it difficult for hackers to crack the user's password
- 4. ransomware attack on a critical US energy infrastructure. Threatened distribution of gas and jet fuel
- 5. type of hacking method that involves hacker cracking user's password
- 7. type of malware
