Cyber Security
Across
- 3. Security systems designed to prevent unauthorized access to or from a private network.
- 4. Networks of hijacked computer devices used to carry out various scams and cyber attacks.
- 6. A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity in electronic communication.
Down
- 1. The process of converting information or data into a code, especially to prevent unauthorized access.
- 2. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 5. Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.