Security

123456789
Across
  1. 3. A string of characters used to secure user accounts.
  2. 6. A malicious program designed to damage or destroy data.
  3. 7. A security barrier that filters and controls network traffic.
  4. 8. A scam where attackers pretend to be a trusted entity to steal information.
  5. 9. The process of converting data into an unreadable form for security.
Down
  1. 1. A duplicate copy of important files for safeguarding against data loss.
  2. 2. A program that appears harmless but allows hackers remote access.
  3. 4. A systematic approach to solving computer problems.
  4. 5. Malicious software designed to gather user information without consent.
  5. 6. A secure connection that allows remote access to a private network.