Across
- 2. Cyber attack that tricks people into revealing sensitive information through email, texts, or phone calls
- 4. The practice of protecting systems, networks, and programs from digital attacks
- 6. a person who uses computers to gain unauthorized access to data
Down
- 1. a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
- 3. the process or action of verifying the identity of a user or process
- 5. who is responsible for the security of an organization?