Cybersecurity

12345678
Across
  1. 7. A method of verifying a user's identity using two different factors.
  2. 8. A small file stored on a user’s device that tracks online activity.
Down
  1. 1. A general term for malicious software.
  2. 2. A scam that tricks users into revealing personal information, often by email.
  3. 3. A person who gains unauthorized access to computer systems.
  4. 4. A secret string used to gain access to a system.
  5. 5. A system that blocks unauthorized access to or from a network.
  6. 6. A self-replicating program that spreads from one computer to another.