Across
- 4. Malicious software that replicates itself and infects computer systems.
- 5. The process of encoding information to protect its confidentiality.
- 9. The practice of protecting computers, servers, and networks from digital threats.
- 10. Software designed to disrupt, damage, or gain unauthorized access to computer systems.
Down
- 1. Criminal activities conducted through the internet, such as fraud, hacking, or identity theft.
- 2. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- 3. A network of infected computers, often controlled by a hacker, used for malicious activities.
- 6. A cyber attack where fraudulent emails or websites are used to deceive individuals and steal sensitive information.
- 7. A person who uses technical skills to gain unauthorized access to computer systems.
- 8. A security measure that protects computer networks from unauthorized access.