CYBERSECURITY AWARENESS - C40

12345678910
Across
  1. 2. The process of analyzing systems for vulnerabilities (8 LETTERS)
  2. 5. A program that replicates itself to spread malware (4 LETTERS)
  3. 6. A security method where each user has specific privileges (6 LETTERS)
  4. 7. Cybercriminals often use this method to monitor network activity (8 LETTERS)
  5. 9. Using multiple types of information to verify identity (14 LETTERS)
  6. 10. Security strategy that requires users to change this regularly (8 LETTERS)
Down
  1. 1. Common method used to protect sensitive data (10 LETTERS)
  2. 2. Fake emails claiming to be from trusted sources (8 LETTERS)
  3. 3. A phrase longer than a password for added security (9 LETTERS)
  4. 4. Network of infected computers controlled remotely (6 LETTERS)
  5. 8. Program designed to prevent unauthorized access (8 LETTERS)