Cybersecurity

12345678910
Across
  1. 2. Network of private computers infected with malicious software
  2. 4. Technique of making data unreadable to unauthorized users
  3. 6. Fraudulent attempt to obtain sensitive information
  4. 7. Barrier between a trusted network and untrusted networks
  5. 9. Software designed to damage, disrupt, or gain unauthorized access
  6. 10. Secret string used to authenticate access
Down
  1. 1. Attacker tricks someone into breaking security procedures
  2. 3. Attempts to guess a password by trying many combinations
  3. 5. Method of verifying identity using fingerprints, retina, etc.
  4. 8. Security flaw allowing attackers to access restricted data