asdfasdfa

12345678910
Across
  1. 4. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.
  2. 6. Converting data into a code to prevent unauthorized access, especially during transmission.
  3. 7. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  4. 9. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  5. 10. Verifying the identity of users or systems to ensure secure access.
Down
  1. 1. Malware that encrypts files, demanding payment for their release.
  2. 2. An update to fix vulnerabilities or improve security in software or systems.
  3. 3. Pertaining to the security challenges and measures for smartphones and tablets.
  4. 5. Safeguarding personal information to ensure confidentiality and compliance with regulations.
  5. 8. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.