Cybersecurity

12345678
Across
  1. 4. A piece of audio or video that has been altered and changed to make it seem authentic or credible.
  2. 6. Software designed to detect, prevent, and remove malicious software from computers.
  3. 8. A malware that spreads through networks without human interaction.
Down
  1. 1. A cybersecurity specialist who uses their skills to find and fix vulnerabilities in computer systems.
  2. 2. A cyber-attack that floods a network or website with excessive traffic to disrupt service.
  3. 3. A barrier that monitors and controls network traffic based on security rules.
  4. 5. An online scam involving the impersonation of reputable entities to obtain sensitive personal information.
  5. 7. A technology that secures connections over the internet, providing secure access to private networks.