Across
- 2. A type of attack where the hacker pretends to be someone else
- 5. Criminal activity involving computers or networks
- 6. Code injected into a website to gain unauthorized access
- 8. Malicious software designed to damage or disrupt systems
- 9. Protects the boundary of a network from unauthorized access
Down
- 1. Secure connection method, often used with Wi-Fi
- 3. Unauthorized access to systems or data
- 4. A weakness in a system that can be exploited
- 7. Secret word used to access an account
- 10. Program used to protect against malware
