Cyber Security Awareness

12345678910
Across
  1. 3. A network security system that monitors and controls incoming and outgoing network traffic.
  2. 4. A network of private computers infected with malicious software and controlled as a group.
  3. 7. Unauthorized access to or manipulation of a computer.
  4. 8. A program designed to damage or do other unwanted actions on a computer.
  5. 10. The process of verifying the identity of a person or device.
Down
  1. 1. The practice of protecting information by transforming it into an unreadable format.
  2. 2. Software designed to gather information about a person or organization without their knowledge.
  3. 5. A type of malicious software that misleads users of its true intent.
  4. 6. A type of cyberattack where the attacker impersonates someone else via email.
  5. 9. Malicious software designed to block access to a computer until a sum of money is paid.