Cybersecurity

12345678910111213
Across
  1. 2. – A system that blocks unauthorized access to a network.
  2. 3. – Someone who exploits system vulnerabilities.
  3. 6. – Malware that locks your files and demands payment.
  4. 9. – Malware disguised as legitimate software.
  5. 11. – Converting data into a secure code to prevent access.
  6. 13. – Fraudulent attempt to obtain sensitive information online.
Down
  1. 1. – Unauthorized access to data or a system.
  2. 4. – Program that detects and removes malware.
  3. 5. – Software that secretly monitors your activity.
  4. 7. – Software designed to harm or exploit a computer.
  5. 8. – A program that spreads and damages files or systems.
  6. 10. – Network of infected computers controlled remotely.
  7. 12. – Secret word or phrase used for authentication.
  8. 13. – Software update that fixes security issues.