Cybersecurity Practices and Attacks

12345678910
Across
  1. 2. Protective barrier against spyware and viruses
  2. 7. Hidden data left by websites on browsers
  3. 8. Process to confirm user identities
  4. 9. Security flaw in software waiting to be patched
  5. 10. A backup copy stored in a separate location
Down
  1. 1. A Scam via mobile messaging
  2. 3. Verifying that data hasn’t been altered
  3. 4. Unauthorized software modification to gain access
  4. 5. A fake digital identity created for fraud
  5. 6. Prevents system access until ransom is paid