Cybersecurity 1

12345678
Across
  1. 3. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  2. 7. A weakness or flaw in a system that can be exploited by attackers.
  3. 8. The process of converting data into a code to prevent unauthorized access.
Down
  1. 1. The process of verifying the identity of a user or system.
  2. 2. A barrier that monitors and controls incoming and outgoing network traffic.
  3. 4. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  4. 5. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
  5. 6. A secret combination of characters used to authenticate users and protect accounts.