Across
- 5. A type of malware that disguises itself as legitimate software (6 letters)
- 7. Software designed to disrupt, damage, or gain unauthorized access (7 letters)
- 9. To bring software up to date with the latest patches or fixes (6 letters)
- 12. Software that secretly monitors user activity (7 letters)
- 14. A security system that controls incoming and outgoing network traffic (7 letters)
- 15. A fraudulent attempt to obtain sensitive information (8 letters)
- 16. Software designed to detect and destroy viruses (9 letters)
Down
- 1. Malware that encrypts files and demands payment for decryption (10 letters)
- 2. Information used to verify a user's identity (11 letters)
- 3. A copy of data stored separately to prevent loss (6 letters)
- 4. Unauthorized access to data or systems (6 letters)
- 6. A secret word or phrase used for authentication (8 letters)
- 8. The process of converting information or data into a secure format (10 letters)
- 10. A fraudulent attempt to obtain sensitive information (8 letters)
- 11. Impersonating a legitimate source to gain unauthorized access (7 letters)
- 13. An individual who uses technical skills to gain unauthorized access (6 letters)
- 17. A tool used to secure and anonymize internet connections (3 letters)
