Cyber Security at ESDC

123456789101112
Across
  1. 1. Person with malicious intentions.
  2. 7. A trap for threat actors.
  3. 8. Method used to secure your data.
  4. 9. Software that infects a device.
  5. 11. Attack that looks at/steals your data.
  6. 12. Attack that locks your data and demands money.
Down
  1. 2. Device used to work.
  2. 3. Cyber attack meant to trick you.
  3. 4. Faking an email address, phone number, etc.
  4. 5. Software meant to protect your device.
  5. 6. Unsolicited emails.
  6. 10. Used to prevent unwanted network access.