Cyber Security

12345
Across
  1. 4. It is a way to scramble data so that only authorized parties can unscramble it.
  2. 5. It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
Down
  1. 1. It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
  2. 2. It is a network security device that monitors traffic to or from your network
  3. 3. It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.