Cyber Security

12345678
Across
  1. 3. Ensuring authorized access to a system or data
  2. 4. An unauthorized entry into a system or network
  3. 7. It's like turning your message into a puzzle that only the right person can solve
  4. 8. Helps prevent unauthorized access and malicious attacks
Down
  1. 1. Harmful software designed to disrupt or damage
  2. 2. A digital trick to steal your personal information
  3. 5. This could be someone wearing a "digital mask", either breaking in for mischief or to find vulnerabilities
  4. 6. Imagine software that's like an invisible spy, quietly gathering your data without you noticing