April (Security) Fools!

12345678910
Across
  1. 3. Malicious software that locks data and demands payment for its release.
  2. 4. A type of malware disguised as legitimate software.
  3. 8. The process of converting information into a secure format.
  4. 9. A barrier that controls the flow of network traffic.
  5. 10. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
  1. 1. Software that secretly monitors and collects information about a user's activities.
  2. 2. Software designed to disrupt, damage, or gain unauthorized access.
  3. 5. The process of verifying the identity of a user or device.
  4. 6. A network of infected devices controlled by a malicious actor.
  5. 7. Software that detects and removes malicious programs.