Across
- 2. Probability of a cyberattack or data breach causing loss or exposure to an organization
- 3. Software or code that cybercriminals use to damage or disrupt devices, steal data, or gain unauthorized access
- 5. practice of protecting systems, networks, and programs from digital attacks
Down
- 1. Text files that contain small amounts of data about a user that can be used for both good and bad purposes
- 4. malicious program that can spread to a computer or network router without the user's knowledge or permission
