Cyber-safety

12345678910
Across
  1. 4. A software that detects and fights malwares.
  2. 6. A program that copies itself in the target device and spreads itself to other devices.
  3. 8. A malicious program whose goal is to damage the target.
  4. 10. A program that hides data transmission from the host computer to the device in control.
Down
  1. 1. Attempt at violating and getting into a digital system.
  2. 2. A cyber attack that overflows the target's data traffic and blocks the connection.
  3. 3. A program that demands payment in order to not lose your files.
  4. 5. A program disguised as a legitimate software.
  5. 7. A software or device that controls the internet traffic flow.
  6. 9. A service that creates encrypted connections between devices.