Cyber security crossword

1234567
Across
  1. 4. A fraudulent attempt to obtain sensitive information, such as usernames, passwords, or credit card details, by pretending to be a trustworthy entity, often via email or fake websites.
  2. 5. Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, and ransomware.
  3. 7. The practices and technologies used to protect websites, users, and data from cyber threats such as hacking, malware, and phishing attacks.
Down
  1. 1. A cyberattack where users are directed to a fake website that looks like a legitimate one in order to steal personal information, such as login credentials or financial data.
  2. 2. Online platforms (such as Facebook, Instagram, and Twitter) where users can create content, share information, and connect with others.
  3. 3. Unwanted, unsolicited messages, usually sent in bulk through email, advertising products or services, or containing links to malicious sites.
  4. 6. The act of gaining unauthorized access to computer systems or networks, often with malicious intent, such as stealing data or causing disruption.