Cyber-safety
Across
- 4. A software that detects and fights malwares.
- 6. A program that copies itself in the target device and spreads itself to other devices.
- 8. A malicious program whose goal is to damage the target.
- 10. A program that hides data transmission from the host computer to the device in control.
Down
- 1. Attempt at violating and getting into a digital system.
- 2. A cyber attack that overflows the target's data traffic and blocks the connection.
- 3. A program that demands payment in order to not lose your files.
- 5. A program disguised as a legitimate software.
- 7. A software or device that controls the internet traffic flow.
- 9. A service that creates encrypted connections between devices.