cyber

12345678
Across
  1. 2. A practice of securing your data by regularly copying it to a separate location.
  2. 5. A technique for protecting your online accounts with a second layer of security.
  3. 7. A type of malware that encrypts your files and demands a ransom for their release.
  4. 8. A common social engineering technique where an attacker pretends to be someone they're not.
Down
  1. 1. A combination of letters, numbers, and symbols that should be hard to guess.
  2. 3. A program that appears legitimate but is harmful, often used to gain unauthorized access to a computer.
  3. 4. An attempt to gain unauthorized access to a computer system or network.
  4. 6. The process of keeping your software up-to-date to protect against vulnerabilities.