CYBERSECURITY CROSSWORD PUZZLE

123456789
Across
  1. 3. The process of converting data into a coded format to prevent unauthorized access.
  2. 4. Malicious software designed to damage or disrupt systems.
  3. 6. A network security device that monitors and filters incoming and outgoing traffic.
  4. 7. A cyberattack method that tricks users into revealing sensitive information.
  5. 8. A copy of data kept in case the original is lost or damaged.
Down
  1. 1. Software that secretly monitors and collects user information.
  2. 2. Secure connection method over the internet, often used for privacy.
  3. 5. A self-replicating program that infects files or systems.
  4. 7. An update to fix software vulnerabilities.
  5. 9. A secret string used for authentication.