Across
- 3. Ensuring authorized access to a system or data
- 4. An unauthorized entry into a system or network
- 7. It's like turning your message into a puzzle that only the right person can solve
- 8. Helps prevent unauthorized access and malicious attacks
Down
- 1. Harmful software designed to disrupt or damage
- 2. A digital trick to steal your personal information
- 5. This could be someone wearing a "digital mask", either breaking in for mischief or to find vulnerabilities
- 6. Imagine software that's like an invisible spy, quietly gathering your data without you noticing
