Cybersecurity Introduction

12345678
Across
  1. 2. Protects your online accounts and prevents unauthorized access
  2. 4. A program that self-replicates and spreads to other computers
  3. 5. The practice of tricking individuals into revealing sensitive information
  4. 6. A type of software designed to block or remove computer viruses
  5. 7. A software vulnerability that allows unauthorized access to a system
  6. 8. Malicious software that encrypts files and demands a ransom
Down
  1. 1. The unauthorized copying or distribution of copyrighted material
  2. 3. The act of intentionally damaging or disrupting computer systems
  3. 5. A set of characters used to gain access to a computer system
  4. 6. A method used to verify the identity of a user