"Lock It Down: A Cybersecurity Challenge"

12345678910
Across
  1. 2. A secret combination used to access accounts (8 letters)
  2. 5. A secure encrypted network connection (3 letters)
  3. 6. The practice of protecting systems from digital attacks (11 letters)
  4. 9. A flaw in software that hackers exploit (8 letters)
  5. 10. Unauthorized access to data (7 letters)
Down
  1. 1. A type of attack that floods a server with traffic (4 letters)
  2. 3. Two-factor ________ (adds extra login security) (12 letters)
  3. 4. A network security system that monitors traffic (8 letters)
  4. 7. Fake emails pretending to be legitimate (8 letters)
  5. 8. Malicious software that encrypts files and demands payment (8 letters)