Cybersecurity

123456789
Across
  1. 2. A piece of software designed to update a computer program or its supporting data, to fix or improve it.
  2. 4. A type of malicious software designed to block access to a computer system until a sum of money is paid.
  3. 6. A network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
  4. 7. Unauthorized access to a network, information systems, or application.
  5. 9. A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying dat
Down
  1. 1. The process of converting information or data into a code, especially to prevent unauthorized access.
  2. 3. The process of recognizing a user's identity to ensure that individuals are who they claim to be.
  3. 5. A type of surveillance software that has the capability to record every keystroke made on a computer.
  4. 8. Fraudulent phone calls or voice messages purporting to be from reputable companies in order to trick individuals into revealing personnel information.
  5. 9. A service that allows you to connect to the internet via a server run by a provider, creating a secure connection.