Cybersecurity

12345678910
Across
  1. 4. Malware disguised as legitimate software
  2. 6. Process of verifying user identity
  3. 8. A vulnerability exploited before being publicly known
  4. 9. Deceptive attempt to steal user credentials via fake emails
  5. 10. Software that secretly gathers user information
Down
  1. 1. Process of converting data into a secure format
  2. 2. System that filters incoming and outgoing network traffic
  3. 3. Malware that encrypts files and demands payment
  4. 5. General term for harmful software like viruses or worms
  5. 7. Program designed to detect and remove malware