Across
- 2. A good practice for authorised users is to use unique ________ passwords
- 4. ____________ type of cyber attack aims to steal data from the computers
- 5. cybersecurity aims to secure _______ components from attackers
- 7. __________ is a person who attempts to get unauthorised access to the computer system
- 8. __________ is a virtual wall between the protected computer and the internet
Down
- 1. __________ are dummy computers that attract hackers to keep the remaining computers safe
- 2. _________ softwares must be used to protect computers against cyberattacks
- 3. Man in the __________ is a type of cyberattack where the communication line is intercepted
- 6. common type of attack which includes trojans and adwares