Across
- 4. A deceptive attempt to steal sensitive information through fake emails or websites.
- 6. A previously unknown vulnerability in software that hackers can exploit.
- 8. A software update that fixes vulnerabilities and improves security.
- 10. A type of malware that locks users out of their data until a payment is made.
- 11. Malicious software designed to secretly monitor and gather information from a user’s device.
- 12. A type of malware disguised as legitimate software to trick users into installing it.
Down
- 1. A network of infected devices controlled remotely by attackers, often used for large-scale cyberattacks.
- 2. A service that encrypts your internet connection for secure browsing, especially over public networks.
- 3. A security system that monitors and controls incoming and outgoing network traffic.
- 5. A method of trial and error used by attackers to guess passwords or encryption keys
- 7. The process of converting data into a code to prevent unauthorized access.
- 9. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
