cyber security

12345678910
Across
  1. 2. Tries to steal information by impersonating a trusted entity.
  2. 4. Security The practice of protecting a computer network from intruders, whether targeted attackers or opportunistic malware.
  3. 7. Specialist Protects a company from cyber threats.
  4. 8. A type of malware that disguises itself as a legitimate software or file to trick users into installing it.
  5. 10. Creates harmful software to damage the network.
Down
  1. 1. The process of converting information or data into a code to prevent unauthorized access.
  2. 3. An incident where unauthorized individuals gain access to confidential data, often resulting in the loss of personal or sensitive information.
  3. 5. Software that secretly monitors user activity on a computer or device, often used to collect personal information.
  4. 6. Acts as a security barrier, inspecting every request and filtering threats.
  5. 9. Attempts to break into a system by manipulating data input.