Cybersecurity
Across
- 4. Malware disguised as legitimate software
- 6. Process of verifying user identity
- 8. A vulnerability exploited before being publicly known
- 9. Deceptive attempt to steal user credentials via fake emails
- 10. Software that secretly gathers user information
Down
- 1. Process of converting data into a secure format
- 2. System that filters incoming and outgoing network traffic
- 3. Malware that encrypts files and demands payment
- 5. General term for harmful software like viruses or worms
- 7. Program designed to detect and remove malware