cybersecurity
Across
- 3. Attack that overwhelms a service
- 5. Malware that demands payment
- 6. Software that secretly monitors activity
- 7. Fraudulent attempt to steal information
- 9. Malware disguised as legitimate software
- 10. Network of compromised devices
Down
- 1. Self-replicating malicious program
- 2. Barrier that filters network traffic
- 4. Technique to protect data
- 8. Malicious software