Cybersecurity

12345678
Across
  1. 3. A secret combination of characters used to authenticate users and protect accounts.
  2. 6. A weakness or flaw in a system that can be exploited by attackers.
  3. 7. Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
  4. 8. A cyberattack method via email that involves tricking individuals into disclosing sensitive information.
Down
  1. 1. A barrier that monitors and controls incoming and outgoing network traffic.
  2. 2. A deliberate attempt to compromise the security, availability, or integrity of computer systems or networks.
  3. 4. The process of verifying the identity of a user or system.
  4. 5. The process of converting data into a code to prevent unauthorized access.