Across
- 3. (4 letters) – A type of malware that spreads copies of itself from computer to computer.
- 4. (6 letters) – A network of computers infected with malware and controlled without the owners’ knowledge.
- 5. (7 letters) – The unauthorized access to or manipulation of computer systems
- 6. (7 letters) – Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 9. (10 letters) – A type of malware that demands payment to restore access to encrypted data.
- 10. (8 letters) – A technique where an attacker disguises themselves as another user or system to gain access to data or resources.
- 12. (8 letters) – Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.
Down
- 1. (8 letters) – A network security system that monitors and controls incoming and outgoing traffic.
- 2. (6 letters) – A type of malware disguised as legitimate software but is harmful once executed.
- 7. (4 letters) – A type of malware that spreads copies of itself from computer to computer.
- 8. (10 letters) – The process of converting data into a code to prevent unauthorized access.
- 11. (7 letters) – Software that secretly collects information about a person or organization.
