Across
- 3. Injection Hacker: Attempts to break into a system by manipulating data input.
- 4. Acts as a security barrier, inspecting every request and filtering threats.
- 6. Breach An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- 7. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- 8. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- 10. Specialist: Protects a company from cyber threats.
Down
- 1. Developer: Creates harmful software to damage the network.
- 2. Horse A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- 5. The process of converting information or data into a code to prevent unauthorized access.
- 9. Scammer: Tries to steal information by impersonating a trusted entity.