Internship_qualification_test

123456789
Across
  1. 4. A type of computer attack that involves intercepting and manipulating data in transit
  2. 7. The process of converting data into a code to protect its confidentiality
  3. 8. A type of computer attack that involves overwhelming a website with traffic
  4. 9. The process of verifying the identity of a user
Down
  1. 1. Most common password
  2. 2. Tricking you into giving away your details, often done through fake Emails
  3. 3. A type of software that protects computer from unwanted access and viruses
  4. 5. Language used to build a Website's structure.
  5. 6. A type of malware that demands payment in exchange for unlocking encrypted files