Cybersecurity

12345678
Across
  1. 2. Software designed to protect systems from malware and cyber threats
  2. 6. The act of stealing personal information for fraudulent use
  3. 7. Unauthorized access to a computer system or network.
  4. 8. A method hackers use to deceive users into sharing sensitive information
Down
  1. 1. The process of converting data into a secure format
  2. 3. A weakness in software that can be exploited by attackers.
  3. 4. The process of identifying and fixing software bugs or vulnerabilities
  4. 5. A type of malicious software that demands payment to restore access