Crossword Competition Name(Required)Email Address(Required)Down:Across:The practice of protecting information from unauthorized access (10 letters)A weakness in a system that can be exploited (10 letters)A security protocol for establishing encrypted links (3 letters)A method of verifying a user's identity (12 letters)A network of infected computers (6 letters)A scam where attackers impersonate a trusted entity (9 letters)Software that protects against viruses (10 letters)A type of malware that demands payment (9 letters)Unauthorized access to data (6 letters)Malicious software (4 letters)A person who tests systems for security flaws (7 letters)A program that records keystrokes (9 letters)A secret word or phrase used to gain access (8 letters)A type of attack that floods a network with traffic (3 letters)A security measure that requires two forms of identification (3 letters)