Across
- 2. Malicious software that damages or disrupts systems
- 3. Two-_____authentication: A security measure requiring two forms of verification
- 5. A software update that fixes security vulnerabilities.
- 7. Malicious software that secretly collects user information
- 9. Fraudulent emails or messages designed to steal sensitive data
- 10. A person who illegally accesses computer systems.
- 12. _____breach-unauthorized access to confidential information
Down
- 1. A type of malware that locks files and demands payment to restore access
- 4. The process of converting data into a secure code
- 6. A type of malware disguised as a legitimate program.
- 8. A security system that blocks unauthorized access
- 11. _____fishing-the act of creating a fake online identity to trick and control others
