Puzzle - 2

12345678910
Across
  1. 3. encrypted parts of the internet that are not indexed by search engines, most notoriously used by all types of criminals
  2. 6. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  3. 8. involves tricking someone into clicking on one object on a web page while they think they are clicking on another.
  4. 9. weaknesses in software programs that can be exploited by hackers to compromise computers.
  5. 10. a type of internet fraud that seeks to acquire a user’s credentials by deception.
Down
  1. 1. the use of online ads to distribute malicious programs. Cybercriminals embed a special script in a banner, or redirect users who click on an ad to a special page containing code for downloading malware.
  2. 2. the process of decoding cipher text to plain text, so it is readable by humans.
  3. 4. a copy of physical or virtual data so in case they are being deleted or lost user could easily recover it.
  4. 5. a form of malicious code that looks like a legit file, program or application, but actually is designed to control the user's computer and data
  5. 7. Cryptocurrency, a form of electronic cash