Across
- 2. A combination of letters, numbers, and symbols used to access an account
- 5. A type of malicious software that encrypts files and demands a ransom
- 7. A set of rules and configurations that protect a computer system from unauthorized access
- 9. A code that is generated by a mobile app and used for two-factor authentication
- 10. Unauthorized access to computer systems
- 11. A technique used to verify the identity of a user, often using a code sent to a phone
Down
- 1. A computer security incident that occurs over a network
- 3. Malicious email that appears to be from a legitimate source
- 4. A program designed to replicate itself and spread to other computers
- 6. The process of converting data into a secret code to prevent unauthorized access
- 8. An attack that overwhelms a system with excessive traffic to make it unavailable
- 10. The weakest link in cybersecurity, often targeted by attackers