Guardians of the Gateway: A Cybersecurity Puzzle

12345678910
Across
  1. 4. A digital band-aid for fixing known security holes
  2. 5. It scrambles your data so only the right key can make sense of it
  3. 6. Like the wooden horse in Troy — looks harmless, but hides something dangerous inside
  4. 9. Your files are locked, and the price to unlock them isn’t cheap
  5. 10. Software with bad intentions — often hidden in innocent-looking files
Down
  1. 1. Like the Impostor in Among Us — pretending to be someone else to cause trouble
  2. 2. Before access is granted, this process asks: “Are you really who you claim to be?
  3. 3. Like James Bond — secretly watching, gathering intel without you knowing
  4. 4. A baited email hoping you’ll bite — and give away your credentials
  5. 7. A secret way into a system — often left open by accident or design
  6. 8. Like Jurassic Park — “The fences are down!” and now the threats are loose