Across
- 2. A practice of securing your data by regularly copying it to a separate location.
- 5. A technique for protecting your online accounts with a second layer of security.
- 7. A type of malware that encrypts your files and demands a ransom for their release.
- 8. A common social engineering technique where an attacker pretends to be someone they're not.
Down
- 1. A combination of letters, numbers, and symbols that should be hard to guess.
- 3. A program that appears legitimate but is harmful, often used to gain unauthorized access to a computer.
- 4. An attempt to gain unauthorized access to a computer system or network.
- 6. The process of keeping your software up-to-date to protect against vulnerabilities.
