CyberSecurity
Across
- 2. Malware that disguises itself as legitimate software (6)
- 4. A team or center that monitors and defends against cyber threats (3)
- 5. A person who gains unauthorized access to systems (6)
- 8. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
- 9. Software update to fix vulnerabilities (5)
- 10. Malicious code that replicates itself by attaching to files (5)
- 12. Malware that encrypts files and demands payment to restore access (10)
Down
- 1. Technique used to convert data into unreadable form for security (10)
- 3. A network of infected devices used for cyber attacks (6)
- 6. Software that secretly gathers user information without consent (7)
- 7. Security system that monitors and controls incoming and outgoing network traffic (8)
- 11. Security method requiring multiple verification steps (3)