cyber security

12345678910
Across
  1. 3. Injection Hacker: Attempts to break into a system by manipulating data input.
  2. 4. Acts as a security barrier, inspecting every request and filtering threats.
  3. 6. Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  4. 7. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  5. 8. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  6. 10. Specialist Protects a company from cyber threats.
Down
  1. 1. Creates harmful software to damage the network.
  2. 2. Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  3. 5. The process of converting information or data into a code to prevent unauthorized access.
  4. 9. Tries to steal information by impersonating a trusted entity.