Across
- 4. Verifying someone’s identity before allowing system access.
- 5. Using two methods (like a password + phone code) to securely confirm identity
- 9. Harmful software designed to damage, steal, or gain access to systems.
- 10. A secret code used to log in and prove identity.
Down
- 1. Privacy: Protecting personal information from misuse and unauthorized access.
- 2. Fake messages that trick you into giving up passwords or personal info.
- 3. Scrambling data so only authorized users can read it.
- 6. A security barrier that blocks unauthorized network access.
- 7. Someone who breaks into systems—some for harm, others for good (security testing).
- 8. Malware that spreads by attaching to files or programs when opened.
