Puzzle - 11

123456789
Across
  1. 4. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  2. 5. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 7. the event of a hacker successfully exploiting a network or device vulnerability and gains access to its files and data.
  4. 8. an isolated environment on a network that mimics end-user operating environments.
  5. 9. Comprised of any number and variety of interconnected devices
Down
  1. 1. the use of electronic means, primarily messaging and social media platforms, to bully and harass a victim.
  2. 2. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  3. 3. Breach of a system's security policy in order to affect its integrity or availability
  4. 5. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
  5. 6. string of characters used to verify the identity of an user during the authentication process