Cybersecurity
Across
- 2. Software that secretly gathers information about a person or organization without their knowledge.
- 4. The process of converting data into a coded format to prevent unauthorized access.
- 7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
- 8. Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
- 9. A software update designed to fix vulnerabilities or bugs in a program or system.
- 10. A network of infected devices controlled remotely by an attacker, often used for large-scale attacks.
Down
- 1. The method of verifying the identity of a user, device, or system before granting access.
- 3. A type of malware disguised as legitimate software to trick users into installing it.
- 5. A type of cyberattack where attackers trick users into revealing sensitive information through deceptive emails or messages.
- 6. Malware that locks or encrypts a victim’s data and demands payment for its release.