Cyber Security

123456789
Across
  1. 4. An unauthorised user who attempts to or gain access to a network
  2. 6. A string of alphabets, numbers and special characters used to authenticate user identity and protect digital information
  3. 8. Securing your online accounts with an extra layer of protection is called ____________________ authentication
  4. 9. Computer programs that can block, detect, and remove viruses and other malware
Down
  1. 1. A mechanism to create a secure connection between a computer and the network
  2. 2. The unauthorised disclosure or unwanted exposure of confidential information
  3. 3. The protection of digital information, as well as the integrity of the infrastructure
  4. 5. Attempting to trick people into revealing sensitive information, often through spam emails and fake websites that look like trusted sources
  5. 7. Faking the sender’s email address to gain access to a secure network