Across
- 2. A scam to steal information through fake communication
- 4. A copy of data stored for recovery in case of loss
- 8. Malicious software that secretly tracks your online activity and steals personal information
- 9. A malicious program that replicates itself and spreads to other systems
- 10. A security method requiring two or more ways to verify your identity before granting access
Down
- 1. Malware that demands payment to restore access to data or systems
- 3. A software update to fix vulnerabilities
- 5. A secret key to access your account
- 6. Someone who gains unauthorized access to systems or networks
- 7. The right to control your personal information and keep it protected from unauthorized access.
