Cybersecurity

12345678
Across
  1. 2. A type of malware that replicates itself by infecting other programs or files.
  2. 4. A method used to circumvent security measures.
  3. 5. An attempt to gain unauthorized access or cause harm to a system.
  4. 7. Weaknesses in a system that can be exploited by attackers.
  5. 8. A technique where attackers use fraudulent emails to steal sensitive information.
Down
  1. 1. Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
  2. 3. The act of disguising communication to appear as if it comes from a trusted source.
  3. 6. An incident where data is accessed without authorization.