Across
- 2. Scrambles data to protect it
- 4. Code flaw that can be exploited
- 5. Secret string used to access a system
- 10. Unauthorized access to data
Down
- 1. Frequent advice: keep this updated
- 3. software – Malware
- 5. Type of scam email
- 6. ____ engineer, manipulates people to gain access
- 7. Type of attack that overwhelms servers
- 8. A ____ firewall protects networks
- 9. A person who breaks into systems
