Across
- 3. A service that encrypts your internet traffic and protects your online identity
- 4. A secret word or phrase used to gain entry or authenticate identity
- 6. The ability or permission to enter, view, or use a system or resource
- 7. An additional security process requiring more than one form of verification
- 8. What you should do when you receive a suspicious email
Down
- 1. A network security system that monitors and controls incoming and outgoing traffic
- 2. Information meant to be kept private and not shared without permission
- 4. The most common cyber attack
- 5. What you should do with your computer when you step away
- 7. Software designed to disrupt, damage, or gain unauthorised access to a computer system
