Across
- 2. Malicious software (5)
- 4. The process of converting information into code to prevent unauthorized access (10)
- 7. An attempt to trick people into giving away sensitive information (9)
- 8. A type of cyber attack that floods a network with traffic (6)
- 9. A program that replicates itself and spreads to other computers (8)
- 10. Protects against unauthorized access (9)
Down
- 1. A security measure using a unique identifier (8)
- 3. Encryption method (7)
- 5. The best MSP around (5)
- 6. A set of rules that controls network traffic (7)
