Across
- 2. Malicious software that demands payment to restore access
- 4. Software designed to disrupt or damage a computer
- 6. Malicious program disguised as legitimate software
- 8. Process of converting information into a code to prevent unauthorized access
- 9. Fraudulent attempt to obtain sensitive information
Down
- 1. Network security device that monitors and controls traffic
- 3. Software that secretly collects user data
- 5. Secure connection over the internet, hiding user location
- 7. Software designed to detect and eliminate viruses
