Across
- 1. An additional step in securing your account
- 4. Malicious software that locks your files until you pay
- 6. An incident where data is accessed without authorization
- 8. Secret word or phrase used to gain access
- 11. The process of verifying who you are
Down
- 1. Malicious software designed to harm your computer
- 2. Fraudulent emails that try to steal your credentials
- 3. Network security system that monitors and controls traffic
- 5. The process of encoding data to prevent unauthorized access
- 7. Someone who gains unauthorizsd access to systems
- 9. Our report phishing button
- 10. Software update to fix security vulnerabilities
