Foundations of Cybersecurity

12345678910
Across
  1. 5. This device inspects and filters network traffic
  2. 6. the process of converting data into a code
  3. 8. the process of verifying an identity before granting access
  4. 9. the process of encoding information so that only the person that the message was intended for can read it
Down
  1. 1. the practice of sending fake emails
  2. 2. a network of compromised computers that are controlled by a single attacker
  3. 3. a weakness within a computer system
  4. 4. software that is designed to disrupt or damage access to a computer
  5. 7. a type of malicious software that secretly gathers a user's personal data
  6. 10. a type of malware that encrypts a victim's files or locks their device, and then demands payment