Across
- 3. Software that secetly gather user data
- 7. The first character of its acronym begins with a number, it is used for two-factor authentication
- 9. A weakness that can be exploited to compromise a system
- 10. Malware that locks data, demanding payment for access
Down
- 1. A group of infected devices controlled by hackers
- 2. Unauthorized access or theft of confidential data
- 4. A software update that fixes security flaws
- 5. A scan to steal sensitive information by pretending to be legitimate
- 6. Harmuful software designed to damage or infiltrate systems
- 8. A system that controls network traffic based on security rules.
