Cybersecurity

123456789
Across
  1. 4. Secret code used to access a device or network
  2. 7. Process of verifying identity
  3. 8. Software designed to harm a device or network
  4. 9. Unauthorized access to a device or network
Down
  1. 1. Criminal activity carried out using technology
  2. 2. Malicious attempt to damage or disrupt a computer system
  3. 3. Weakness in a system that can be exploited
  4. 4. Fraudulent attempt to gain sensitive information
  5. 5. System designed to prevent unauthorized access
  6. 6. Method of protecting information