Cyber Security Puzzle

1234567891011
Across
  1. 3. The process of verifying the identity of a user
  2. 4. A method of disguising data to protect it
  3. 6. A device that helps protect networks by filtering traffic
  4. 8. A breach where sensitive data is accessed unlawfully
  5. 9. A malicious email designed to trick recipients
  6. 11. A protocol used to send emails securely
Down
  1. 1. A common form of malware that locks files
  2. 2. A program that scans for vulnerabilities in systems
  3. 5. A common cybersecurity measure that involves using complex passwords
  4. 7. Software that detects and removes malware
  5. 8. A type of attack where multiple systems are used to overwhelm a target
  6. 10. A legal framework for data protection in the EU