travis cyber

12345678910
Across
  1. 3. Deceptive attempts to acquire sensitive information by pretending to be a trustworthy entity.
  2. 6. Malicious software designed to harm or exploit systems, often through viruses, worms, or ransomware.
  3. 8. Verifying the identity of users or systems to ensure secure access.
  4. 10. Safeguarding personal information to ensure confidentiality and compliance with regulations.
Down
  1. 1. Pertaining to the security challenges and measures for smartphones and tablets.
  2. 2. A cybersecurity event that poses a threat to the confidentiality, integrity, or availability of data.
  3. 4. Malware that encrypts files, demanding payment for their release.
  4. 5. An update to fix vulnerabilities or improve security in software or systems.
  5. 7. Converting data into a code to prevent unauthorized access, especially during transmission.
  6. 9. A barrier that monitors and controls incoming and outgoing network traffic to prevent unauthorized access.