cybersecurity

12345678910
Across
  1. 3. Attack that overwhelms a service
  2. 5. Malware that demands payment
  3. 6. Software that secretly monitors activity
  4. 7. Fraudulent attempt to steal information
  5. 9. Malware disguised as legitimate software
  6. 10. Network of compromised devices
Down
  1. 1. Self-replicating malicious program
  2. 2. Barrier that filters network traffic
  3. 4. Technique to protect data
  4. 8. Malicious software