Across
- 3. Software designed to detect and remove malware
- 5. A form of malware that demands payment to restore access to data
- 7. Malicious software that secretly monitors and collects personal information from a user’s device
- 8. The practice of keeping personal and sensitive information secure from unauthorized access or disclosure
- 9. The process of converting information into a secret code
Down
- 1. A method of verifying a user’s identity using something they know, have, or are
- 2. A software flaw that can be exploited by attackers
- 4. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
- 6. A string of characters used to verify your identity online
- 10. A scam where attackers trick you into giving personal information
