Across
- 2. Tries to steal information by impersonating a trusted entity.
- 4. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
- 7. Specialist Protects a company from cyber threats.
- 8. A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
- 10. Creates harmful software to damage the network.
Down
- 1. The process of converting information or data into a code to prevent unauthorized access.
- 3. An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
- 5. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
- 6. Acts as a security barrier, inspecting every request and filtering threats.
- 9. Attempts to break into a system by manipulating data input.