Cybersecurity
Across
- 4. Designed to deny a user or organisation access to files on their computer.
- 5. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
- 6. An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
- 1. Intrusive software developed to steal data and damage or destroy computers and computer systems.
- 2. When attackers attempt to trick users into doing 'the wrong thing.
- 3. Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.