Cyber Security

12345678910111213141516
Across
  1. 2. A part of the internet that isn't indexed by search engines
  2. 4. The conversion of information or data into a code
  3. 6. Fraudulent email that demands urgent action
  4. 8. A portmanteau of “malicious” and “software”
  5. 11. A type of malicious software
  6. 12. Virtual Private Network
  7. 14. The process of identifying a user’s identity
  8. 16. bypassing an organization's existing security systems
Down
  1. 1. The use of electronics to bully someone
  2. 3. The manipulation of facial appearance through deep generative methods.
  3. 5. A form of malware used by hackers to spy on you and your computer activities
  4. 7. a network security device that monitors and filters incoming and outgoing network traffic
  5. 9. Artificial intelligence
  6. 10. A means of attack on a computer system
  7. 13. he result of a hacker successfully breaking into a system,
  8. 15. A piece of data from a website that is saved within a web browser and can be retrieved by the website at a later time
  9. 16. An error, fault in a computer system