cyber security Games

1234567
Across
  1. 3. A fraudulent email or message that appears to be from a legitimate source.
  2. 4. A type of malicious software that encrypts files and demands a ransom for decryption.
  3. 5. A strong, complex, and unique string of characters used to protect accounts.
  4. 6. The act of protecting information from unauthorized access.
  5. 7. A device or software used to protect against malware and other cyber threats.
Down
  1. 1. A method of authenticating users based on their physical or behavioral traits.
  2. 2. A program designed to detect and remove malicious software.
  3. 5. A technique used to trick individuals into revealing sensitive information.