Cybersecurity
Across
- 2. Software designed to protect systems from malware and cyber threats
- 6. The act of stealing personal information for fraudulent use
- 7. Unauthorized access to a computer system or network.
- 8. A method hackers use to deceive users into sharing sensitive information
Down
- 1. The process of converting data into a secure format
- 3. A weakness in software that can be exploited by attackers.
- 4. The process of identifying and fixing software bugs or vulnerabilities
- 5. A type of malicious software that demands payment to restore access