Across
- 3. Malicious software that locks data and demands payment for its release.
- 4. A type of malware disguised as legitimate software.
- 8. The process of converting information into a secure format.
- 9. A barrier that controls the flow of network traffic.
- 10. A deceptive attempt to obtain sensitive information by pretending to be a trustworthy entity
Down
- 1. Software that secretly monitors and collects information about a user's activities.
- 2. Software designed to disrupt, damage, or gain unauthorized access.
- 5. The process of verifying the identity of a user or device.
- 6. A network of infected devices controlled by a malicious actor.
- 7. Software that detects and removes malicious programs.
