Across
- 1. A champion of cybersecurity
- 5. The process of identifying a users identity
- 6. Changing the IP address of an email so it appears to come from a trusted source
- 7. Malicious software used to damage or infect a system
- 8. A means of attack, a vulnerability
- 10. Technology used to keep hackers out of a system
Down
- 2. Coding to protect information
- 3. Malware that hijacks a system in return for payment
- 4. Malware that corrupts a system, then spreads to other systems
- 9. Practice of posing as someone legitimate to gain access