Across
- 1. A cybersecurity measure that verifies identity using something you know and something you have.
- 4. A cybersecurity practice that scrambles data to protect it.
- 7. A fake website designed to steal login credentials.
- 9. A type of cyberattack that floods a server with traffic to take it down.
- 10. A type of virus that disguises itself as a legitimate program.
Down
- 2. The process of confirming that a user is who they claim to be.
- 3. A program that secretly records what a user types to steal passwords.
- 5. A type of attack where hackers encrypt files and demand payment.
- 6. A malicious software that spreads without user action.
- 8. Tricking someone into revealing personal information through fake emails.
