Digital Defense and Data Breach Insights
Moderate difficulty suitable for most players
1
2
3
4
5
6
7
8
Across
- 1. Physical or digital object used to authenticate identity
- 2. Deceptive emails that lure users into revealing sensitive info
- 3. Short for a weakness that can be exploited in a system
- 6. Malicious software that secretly monitors user activity
Down
- 4. Network security system that blocks unauthorized access
- 5. Unauthorized access to confidential data or systems
- 7. To convert data into coded form to prevent unauthorized reading
- 8. Software designed to disrupt or damage a system
Similar Crossword Puzzles
No similar crossword puzzles.