FIRST ROUND

12345678
Across
  1. 1. Malicious software designed to harm or exploit computer systems
  2. 4. Malware disguised as legitimate software, used to gain unauthorized access
  3. 6. The process of converting data into a coded form to prevent unauthorized access
  4. 8. A type of cyber attack where attackers trick users into revealing sensitive information
Down
  1. 2. The process of verifying the identity of a user or device
  2. 3. A network security system that monitors and controls incoming and outgoing traffic
  3. 5. Copying data to prevent loss in case of system failure or attack
  4. 7. A type of malware that can replicate itself and spread to other computers