Across
- 5. A security method that requires two different forms of verification to log in.
- 6. A person who illegally gains access to computer systems.
- 8. A deceptive method used to trick users into revealing personal information through fake emails or websites.
- 9. The process of verifying a user’s identity before granting access.
Down
- 1. Harmful software designed to damage or disrupt computer systems.
- 2. A malicious program that spreads and infects other files or systems.
- 3. The protection of personal and sensitive information from misuse.
- 4. The process of converting information into secure code to protect it from unauthorized access.
- 7. A security system that monitors and blocks unauthorized network access.
- 8. A secret combination of characters used to access an account.
