cybersecurity

12345678
Across
  1. 1. Another protocol for securing internet communications
  2. 3. A piece of software designed to fix a vulnerability or bug.
  3. 5. Malicious software designed to disrupt computer operations, steal data, or gain unauthorized access to a computer system.
  4. 8. The process of converting information into a secret code to prevent unauthorized access.
Down
  1. 2. someone who seeks to break into unauthorized computer systems.
  2. 4. A type of malware that restricts access to a computer system or data until a ransom is paid.
  3. 6. A cyberattack where a hacker poses as a trusted entity to trick a user into providing sensitive information.
  4. 7. A network security system that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic.