CYBER SECURITY PUZZLE

12345678
Across
  1. 2. malware that employs encryption to hold a victim's information at ransom.
  2. 5. weaknesses in a system that gives threats the opportunity to compromise assets.
  3. 6. uses trial-and-error to guess login info, encryption keys, or find a hidden web page.
  4. 8. type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity
Down
  1. 1. the ability an organization or individual has to determine what data in a computer system can be shared with third parties.
  2. 3. intrusive software that is designed to damage and destroy computers and computer systems
  3. 4. threat that embeds itself within a computer or mobile device and then uses its resources to mine cryptocurrency.
  4. 7. type of malicious code or software that looks legitimate but can take control of your computer.