cybersecurity

123456789
Across
  1. 4. protocol for securing internet communications
  2. 5. malware that watch your online activities without you knowing
  3. 6. type of attack that involves trying all possibilities to find a password or codes
  4. 8. design flaw in a computer program
  5. 9. encrypt messages with keys
Down
  1. 1. weakness in a computer system allowing an attacker to harm the integrity of that system
  2. 2. check the data flows and what types of communications are allowed on a computer network.
  3. 3. computer attack that aims to obtain personal data by relying on identity theft
  4. 7. block access to the computer or files and demand payment