Across
- 2. - Fake email scan to steal your info
- 4. - A cyber trick used to mislead and exploit.
- 7. - Login method using two or more verification steps
- 8. - Malicious attempt to damage or access systems
- 9. - Secret codes that grant access to your accounts
Down
- 1. - Secures your internet connection and hides your IP
- 3. - Someone skilled at breaking into systems
- 5. - The process of claiming who you are, before verification
- 6. - Software designed to harm your computer or data
- 10. - Imitating a trusted source to trick someone
