Cybersecurity

123456789
Across
  1. 5. A harmful program that damages computers or steals information.
  2. 7. Rules that guide how computers communicate securely.
  3. 8. A system that spots unauthorized access to a network.
  4. 9. A way to verify if someone is who they claim to be.
Down
  1. 1. When sensitive information is accessed without permission.
  2. 2. A barrier that protects a computer from harmful connections.
  3. 3. A weakness in a system that can be exploited by hackers.
  4. 4. A process that scrambles data to keep it secure.
  5. 6. An attempt to harm a computer system or steal data.
  6. 7. A scam where fake emails trick people into giving personal information.