Cybersecurity Crossword Puzzle

12345678910
Across
  1. 4. Verifying someone’s identity before allowing system access.
  2. 5. Using two methods (like a password + phone code) to securely confirm identity
  3. 9. Harmful software designed to damage, steal, or gain access to systems.
  4. 10. A secret code used to log in and prove identity.
Down
  1. 1. Privacy: Protecting personal information from misuse and unauthorized access.
  2. 2. Fake messages that trick you into giving up passwords or personal info.
  3. 3. Scrambling data so only authorized users can read it.
  4. 6. A security barrier that blocks unauthorized network access.
  5. 7. Someone who breaks into systems—some for harm, others for good (security testing).
  6. 8. Malware that spreads by attaching to files or programs when opened.