Cybersecurity

123456789101112
Across
  1. 1. / Harmful computer program
  2. 6. / Secret characters for authentication
  3. 7. / Strong, unique password practice
  4. 10. / Encoding information for authorized access only
  5. 11. / Fraudulent emails to get personal information
  6. 12. / Cyberattack encrypting data for ransom
Down
  1. 2. / Software protecting against viruses
  2. 3. / Fake website or email to deceive users
  3. 4. / Method requiring multiple evidence for identity
  4. 5. / Gaining unauthorized system access
  5. 8. / Settings controlling information visibility
  6. 9. / Network of infected computers controlled unknowingly