Across
- 6. Common type of cyberattack where the hacker encrypts your files and demands payment.
- 10. This form of attack tries to trick you into giving personal information via fake websites or emails.
- 11. A software that fights off malicious viruses and malware.
- 13. The process of verifying someone's identity.
Down
- 1. A person who attempts to gain unauthorized access to your system.
- 2. A harmful program disguised as legitimate software.
- 3. A malicious code that spreads from computer to computer.
- 4. A type of phishing attack done over text messages.
- 5. A ____ test is performed to identify vulnerabilities in a system.
- 7. A phishing attack done over the phone.
- 8. Multi-Factor Authentication is shortened to this.
- 9. Protection against unauthorized changes to data.
- 10. A strong, complex one helps protect your accounts.
- 12. The backbone of secure communication online, abbreviated as SSL.