Cybersecurity

123456
Across
  1. 4. Designed to deny a user or organisation access to files on their computer.
  2. 5. The act of compromising digital devices and networks through unauthorized access to an account or computer system.
  3. 6. An attack or threat of an attack coupled with a demand for money or some other response in return for stopping or remediating the attack.
Down
  1. 1. Intrusive software developed to steal data and damage or destroy computers and computer systems.
  2. 2. When attackers attempt to trick users into doing 'the wrong thing.
  3. 3. Process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it.