Cybersecurity Fundamentals
Across
- 3. Process of converting data to unreadable form
- 4. Software that locks files for payment
- 6. Protection that filters network traffic
- 9. Weakness that attackers can exploit
- 10. Hidden access point in a system
Down
- 1. Software that secretly monitors user activity
- 2. Self-replicating code that attaches to programs
- 5. Software that blocks unauthorized content
- 7. Malicious software designed to harm systems
- 8. Fraudulent emails attempting to steal data