Cybersecurity

123456789
Across
  1. 2. Protecting data by scrambling it mathematically
  2. 3. Data which requires special limited access that can cause harm if disclosed
  3. 6. Sending fraudulent communications to take data or trick others into performing certain actions, usually by text or email
  4. 9. A piece of code that adversely affects computers; typically to corrupt the system, steal data, or gain access
Down
  1. 1. Network security device that monitors and filters incoming and outgoing network traffic
  2. 4. Software designed to detect and destroy computer viruses
  3. 5. Data that pertains directly to the company and has restricted access
  4. 7. A person who uses computers to gain unauthorized access to data
  5. 8. Data that is freely accessible to all