CYBERSECURITY

12345678910
Across
  1. 2. A digital security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
  2. 4. The act of intentionally accessing a system or network without authorization, often to steal data or damage the system.
  3. 6. A secure connection that allows users to access the internet privately by routing their connection through a server, masking their IP address.
  4. 9. A weakness or flaw in a system, software, or network that can be exploited by attackers to gain unauthorized access or cause harm.
  5. 10. A type of malware that locks or encrypts a victim’s files, demanding payment (ransom) for their release.
Down
  1. 1. Malicious software that pretends to be legitimate or harmless software to gain unauthorized access to a system.
  2. 3. The process of converting information into a code to prevent unauthorized access, ensuring data remains private.
  3. 5. A type of cyber attack where attackers impersonate legitimate entities to trick individuals into revealing sensitive information.
  4. 7. A general term for malicious software designed to disrupt, damage, or gain unauthorized access to a computer system.
  5. 8. Software that secretly monitors and collects a user's activities and personal information without their consent.