Cybersecurity Vocabulary Crossword

123
Across
  1. 2. used to prove one's identity, or authorize access to a resource
  2. 3. attaches itself with host file and replicates
Down
  1. 1. designed to damage and destroy networks and computer systems
  2. 2. practice of sending fraudulent messages that appear to come from a reputable source