Tech

12345678910
Across
  1. 2. Malicious software (5)
  2. 4. The process of converting information into code to prevent unauthorized access (10)
  3. 7. An attempt to trick people into giving away sensitive information (9)
  4. 8. A type of cyber attack that floods a network with traffic (6)
  5. 9. A program that replicates itself and spreads to other computers (8)
  6. 10. Protects against unauthorized access (9)
Down
  1. 1. A security measure using a unique identifier (8)
  2. 3. Encryption method (7)
  3. 5. The best MSP around (5)
  4. 6. A set of rules that controls network traffic (7)