CrosswordMint
Digital Defense and Data Breach Insights
Moderate difficulty suitable for most players
1
2
3
4
5
6
7
8
Across
  • 1. Physical or digital object used to authenticate identity
  • 2. Deceptive emails that lure users into revealing sensitive info
  • 3. Short for a weakness that can be exploited in a system
  • 6. Malicious software that secretly monitors user activity
Down
  • 4. Network security system that blocks unauthorized access
  • 5. Unauthorized access to confidential data or systems
  • 7. To convert data into coded form to prevent unauthorized reading
  • 8. Software designed to disrupt or damage a system

Similar Crossword Puzzles

No similar crossword puzzles.