Cyber-crossing

12345678
Across
  1. 2. The act of disguising as a trusted entity to obtain information.
  2. 5. Media that has been adjusted to spread falsified information.
  3. 6. Steps taken to protect a device from threats.
  4. 7. 2 Step verification is an example of:
Down
  1. 1. A secret word or phrase used to gain access.
  2. 3. Impersonation of another person to commit crimes.
  3. 4. A type of malware with the ability to spread throughout a system.
  4. 8. Someone who gains unauthorised access to systems.