Across
- 2. A secret combination used to access accounts (8 letters)
- 5. A secure encrypted network connection (3 letters)
- 6. The practice of protecting systems from digital attacks (11 letters)
- 9. A flaw in software that hackers exploit (8 letters)
- 10. Unauthorized access to data (7 letters)
Down
- 1. A type of attack that floods a server with traffic (4 letters)
- 3. Two-factor ________ (adds extra login security) (12 letters)
- 4. A network security system that monitors traffic (8 letters)
- 7. Fake emails pretending to be legitimate (8 letters)
- 8. Malicious software that encrypts files and demands payment (8 letters)
