Across
- 5. - An attempt to acquire sensitive information by posing as a trustworthy entity.
- 7. - The act of securing data by converting it into a code.
- 9. - Software that collects personal information without consent.
- 10. - Process of a system being affected by malware.
- 12. - Software intended to harm a computer or user.
- 15. - Making copies of data to prevent loss.
- 16. - Place where infected files are held to prevent harm.
- 17. - Type of malware that encrypts files, demanding payment for their release.
- 19. - Malicious software designed to damage or disrupt systems.
Down
- 1. - The state of being guarded against malware and cyber threats.
- 2. - A program that detects, prevents, and removes malicious software.
- 3. - Potential source of harm to a computer system.
- 4. - A security system that controls incoming and outgoing network traffic.
- 6. - Unauthorized intrusion into a computer or network.
- 8. - Practices to defend computers from digital threats.
- 9. - The process of analyzing a computer to detect malware.
- 11. - Program that seems legitimate but is used to deceive users and cause harm.
- 13. - Process of installing the latest security patches and software fixes.
- 14. - Unwanted software designed to throw advertisements.
- 18. - A self-replicating program that spreads without human intervention.