Across
- 5. A secret word or phrase used to gain access to a computer system (8 letters)
- 6. A network security system that monitors and controls incoming and outgoing network traffic (8 letters)
- 8. The process of converting information or data into a code, especially to prevent unauthorized access (11 letters)
Down
- 1. Software that is designed to detect and destroy computer viruses (9 letters)
- 2. The unauthorized use of someone else's computer resources, often for mining cryptocurrency (8 letters)
- 3. The practice of protecting systems, networks, and programs from digital attacks (10 letters)
- 4. A type of malicious software designed to block access to a computer system until a sum of money is paid (10 letters)
- 5. An attempt to obtain sensitive information by disguising as a trustworthy entity (8 letters)
- 7. Unsolicited email, often used for advertising or phishing (4 letters)