Internship_qualification_test

123456789
Across
  1. 2. Tricking you into giving away your details, often done through fake Emails
  2. 5. A type of malware that demands payment in exchange for unlocking encrypted files
  3. 9. The process of verifying the identity of a user
Down
  1. 1. A type of software that protects computer from unwanted access and viruses
  2. 3. A type of computer attack that involves intercepting and manipulating data in transit
  3. 4. Most common password
  4. 6. The process of converting data into a code to protect its confidentiality
  5. 7. , A type of computer attack that involves overwhelming a website with traffic
  6. 8. Language used to build a Website's structure.