Across
- 1. Software designed to detect and remove malicious programs
- 3. A scam where attackers trick users into giving up sensitive info
- 4. Factor Authentication A method of verifying identity using multiple factors
- 6. A weakness in a system that can be exploited
- 8. A secret word or phrase used to gain access
- 9. Keeping software up to date helps prevent these
Down
- 2. A type of malware that locks data until a ransom is paid
- 5. A network security system that monitors and controls traffic
- 7. A person who uses computers to gain unauthorized access
