Across
- 2. The act of disguising as a trusted entity to obtain information.
- 5. Media that has been adjusted to spread falsified information.
- 6. Steps taken to protect a device from threats.
- 7. 2 Step verification is an example of:
Down
- 1. A secret word or phrase used to gain access.
- 3. Impersonation of another person to commit crimes.
- 4. A type of malware with the ability to spread throughout a system.
- 8. Someone who gains unauthorised access to systems.
