Cybersecurity

123456789
Across
  1. 1. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity
  2. 4. Malware that locks or encrypts data, demanding payment for its release
  3. 8. A person who gains unauthorized access to systems or networks
  4. 9. Process of converting data into a code to prevent unauthorized access
Down
  1. 1. A secret word or phrase used to authenticate access to data or systems
  2. 2. Software that secretly monitors user activity and collects information
  3. 3. Malicious software designed to harm, exploit, or disable computers
  4. 5. A security system that monitors and controls incoming and outgoing network traffic
  5. 6. Software used to detect, prevent, and remove malicious software
  6. 7. A secure network connection that allows users to send and receive data as if they were on a private network