Cyber Safety

123456789
Across
  1. 4. A secret word or phrase used to authenticate access to a system or account.
  2. 5. The process of converting information into a secure format to prevent unauthorized access.
  3. 7. Software designed to detect and remove malicious software from a computer.
  4. 9. A software update that fixes vulnerabilities and improves security.
Down
  1. 1. A method of authentication that requires two different forms of identification to access an account.
  2. 2. A copy of data stored separately to prevent data loss in case of a cyber attack or system failure.
  3. 3. The process of installing the latest versions of software to protect against vulnerabilities
  4. 4. The fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
  5. 6. A network security system that monitors and controls incoming and outgoing network traffic.
  6. 8. A Virtual Private Network that creates a secure connection over the internet.