Across
- 1. / Harmful computer program
- 6. / Secret characters for authentication
- 7. / Strong, unique password practice
- 10. / Encoding information for authorized access only
- 11. / Fraudulent emails to get personal information
- 12. / Cyberattack encrypting data for ransom
Down
- 2. / Software protecting against viruses
- 3. / Fake website or email to deceive users
- 4. / Method requiring multiple evidence for identity
- 5. / Gaining unauthorized system access
- 8. / Settings controlling information visibility
- 9. / Network of infected computers controlled unknowingly