Cybersecurity Fundamentals

12345678910
Across
  1. 3. Process of converting data to unreadable form
  2. 4. Software that locks files for payment
  3. 6. Protection that filters network traffic
  4. 9. Weakness that attackers can exploit
  5. 10. Hidden access point in a system
Down
  1. 1. Software that secretly monitors user activity
  2. 2. Self-replicating code that attaches to programs
  3. 5. Software that blocks unauthorized content
  4. 7. Malicious software designed to harm systems
  5. 8. Fraudulent emails attempting to steal data