Cybersecurity
Across
- 4. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
- 6. Software designed to detect, prevent, and remove malicious software from computers.
- 8. A malware that spreads through networks without human interaction.
Down
- 1. A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
- 2. A cyber-attack that floods a network or website with excessive traffic to disrupt service.
- 3. A barrier that monitors and controls network traffic based on security rules.
- 5. An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
- 7. A technology that secures connections over the internet, providing secure access to private networks.