Cyber Security

123456789
Across
  1. 3. When data is transformed into a format that is unreadable without a decryption key
  2. 4. Software designed to harm or exploit any programmable device, service, or network
  3. 6. Someone who tests system security by trying to find vulnerabilities
  4. 7. Technique used by attackers to gain access to a user’s system or data by pretending to be a trusted entity
  5. 8. A security measure that uses a combination of letters, numbers, and symbols to protect accounts
  6. 9. A type of cyberattack where hackers overwhelm a website or server with excessive requests
Down
  1. 1. A weak spot in a system’s security defenses
  2. 2. Malicious software that locks a user’s files and demands a ransom to restore access
  3. 5. A process used to verify a user’s identity, typically through passwords or biometrics