Cybersecurity
Across
- 1. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
- 4. Malware that locks or encrypts data, demanding payment for its release
- 8. A person who gains unauthorized access to systems or networks
- 9. Process of converting data into a code to prevent unauthorized access
Down
- 1. A secret word or phrase used to authenticate access to data or systems
- 2. Software that secretly monitors user activity and collects information
- 3. Malicious software designed to harm, exploit, or disable computers
- 5. A security system that monitors and controls incoming and outgoing network traffic
- 6. Software used to detect, prevent, and remove malicious software
- 7. A secure network connection that allows users to send and receive data as if they were on a private network