Across
- 3. A fraudulent email or message that appears to be from a legitimate source.
- 4. A type of malicious software that encrypts files and demands a ransom for decryption.
- 5. A strong, complex, and unique string of characters used to protect accounts.
- 6. The act of protecting information from unauthorized access.
- 7. A device or software used to protect against malware and other cyber threats.
Down
- 1. A method of authenticating users based on their physical or behavioral traits.
- 2. A program designed to detect and remove malicious software.
- 5. A technique used to trick individuals into revealing sensitive information.
