Cyber Challenges

123456789101112
Across
  1. 2. Malicious software that damages or disrupts systems
  2. 3. Two-_____authentication: A security measure requiring two forms of verification
  3. 5. A software update that fixes security vulnerabilities.
  4. 7. Malicious software that secretly collects user information
  5. 9. Fraudulent emails or messages designed to steal sensitive data
  6. 10. A person who illegally accesses computer systems.
  7. 12. _____breach-unauthorized access to confidential information
Down
  1. 1. A type of malware that locks files and demands payment to restore access
  2. 4. The process of converting data into a secure code
  3. 6. A type of malware disguised as a legitimate program.
  4. 8. A security system that blocks unauthorized access
  5. 11. _____fishing-the act of creating a fake online identity to trick and control others