Across
- 2. Verifying the identity of a user, often using a username and password.
- 4. A fake website designed to steal personal information.
- 5. The practice of protecting systems and networks from digital attacks.
- 6. A program that replicates itself and spreads to other computers.
- 8. A software that monitors and blocks unauthorized access to a computer network.
- 10. A fraudulent email disguised as being from a trustworthy source to trick a user.
Down
- 1. A string of characters used to log in to a system, it should be unique and complex.
- 3. Adding a second layer of verification beyond a password, often a code sent to your phone
- 7. The"lock" icon in a browser's address bar indicates a secure connection using this .
- 9. A type of malware that blocks access to your data until a sum of money is paid.
