Cyber Security

12345678910
Across
  1. 3. A unique address that identifies a device on the internet
  2. 5. A security mechanism that creates a virtual trap to lure attackers
  3. 6. Servers that are accessed over the internet
  4. 8. A network security device that monitors and filters incoming and outgoing network traffic
  5. 9. A form of malware that hides on your device, monitors your activity, and steals sensitive information like bank details and passwords
  6. 10. A network of computers infected by malware that are under the control of a single attacking party
Down
  1. 1. Phishing attacks that involve the use of voice calls
  2. 2. An undocumented way of gaining access to computer system
  3. 4. A type of artificial intelligence used to create convincing images, audio and video hoaxes
  4. 7. The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable