Across
- 3. A network security system that monitors and controls incoming and outgoing network traffic.
- 4. A network of private computers infected with malicious software and controlled as a group.
- 7. Unauthorized access to or manipulation of a computer.
- 8. A program designed to damage or do other unwanted actions on a computer.
- 10. The process of verifying the identity of a person or device.
Down
- 1. The practice of protecting information by transforming it into an unreadable format.
- 2. Software designed to gather information about a person or organization without their knowledge.
- 5. A type of malicious software that misleads users of its true intent.
- 6. A type of cyberattack where the attacker impersonates someone else via email.
- 9. Malicious software designed to block access to a computer until a sum of money is paid.
