Across
- 1. Another protocol for securing internet communications
- 3. A piece of software designed to fix a vulnerability or bug.
- 5. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
- 8. The process of converting information into a secret code to prevent unauthorized access.
Down
- 2. someone who seeks to break into unauthorized computer systems.
- 4. A type of malware that restricts access to a computer system or data until a ransom is paid.
- 6. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
- 7. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.