Cyber security

12345678
Across
  1. 3. verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer
  2. 6. facts provided or learned about something or someone.
  3. 8. malware that replicates and transfers itself to other computers via a network
Down
  1. 1. The authorization given to users that enables them to access specific resources on the network,
  2. 2. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
  3. 4. someone who hacks into your account
  4. 5. information that has been translated into a form that is efficient for movement or processing
  5. 7. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.