Cybersecurity

12345678
Across
  1. 4. malicious actor disguising their identity by faking a trusted source
  2. 6. he state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
  3. 8. accessing data without authorisation
Down
  1. 1. a computer program that damages or reveals data
  2. 2. a protective system for computer systems
  3. 3. unauthorised access to confidential, sensitive or protected data
  4. 5. a malicious attack via email
  5. 7. information stored on a computer or system