Cyber security risks

1234567891011
Across
  1. 4. this is a software to design to detect and destroy computer viruses
  2. 7. a person who uses computers to gain unauthorized access to data
  3. 9. a network of social interactions and personal relationships
  4. 10. the action of keeping your device safe
  5. 11. this is a software which is specifically designed to disrupt, damage, or gain unauthorised access to a computer system
Down
  1. 1. a piece of code which is capable of copying itself and can corrupts the system or destroying data
  2. 2. this is a software that threatens to delete your data for a specific amount of money
  3. 3. a person who gains unauthorised access to computer files or networks in order to further social or political ends
  4. 5. fraudulent practice of sending emails pretending to be from reputable companies
  5. 6. convert information or data into a code especially to prevent unauthorised access
  6. 8. a computer program that records every keystroke made by a computer user
  7. 10. a secret word or phrase that must be used to gain admission to a place