Aq QN-Mag-Q1

123456789101112
Across
  1. 4. A deceptive attempt to steal sensitive information through fake emails or websites.
  2. 6. A previously unknown vulnerability in software that hackers can exploit.
  3. 8. A software update that fixes vulnerabilities and improves security.
  4. 10. A type of malware that locks users out of their data until a payment is made.
  5. 11. Malicious software designed to secretly monitor and gather information from a user’s device.
  6. 12. A type of malware disguised as legitimate software to trick users into installing it.
Down
  1. 1. A network of infected devices controlled remotely by attackers, often used for large-scale cyberattacks.
  2. 2. A service that encrypts your internet connection for secure browsing, especially over public networks.
  3. 3. A security system that monitors and controls incoming and outgoing network traffic.
  4. 5. A method of trial and error used by attackers to guess passwords or encryption keys
  5. 7. The process of converting data into a code to prevent unauthorized access.
  6. 9. Software specifically designed to disrupt, damage, or gain unauthorized access to a computer system.