Across
- 1. Unauthorized access to sensitive information (6 LETTERS)
- 5. A security method involving two types of validation (3 LETTERS)
- 7. The process of converting data into unreadable code (10 LETTERS)
- 9. Fake websites that mimic legitimate ones to steal info (8 LETTERS)
- 10. A secure way to browse the internet by hiding your data (3 LETTERS)
- 11. Regular updates to fix software vulnerabilities (7 LETTERS)
Down
- 2. A type of malware that demands payment (10 LETTERS)
- 3. Secret word or phrase used to gain access (8 LETTERS)
- 4. A form of attack where hackers trick users via email (8 LETTERS)
- 5. Software designed to disrupt, damage, or gain unauthorized access (7 LETTERS)
- 6. Protects your system from harmful software (9 LETTERS)
- 8. Harmful email attachment often used to spread malware (6 LETTERS)