Across
- 2. A cyber attack that tricks people into revealing personal information via fake emails or websites.
- 3. Malicious software that secretly gathers user information.
- 5. Software designed to harm or exploit computer systems.
- 6. A type of malware that disguises itself as legitimate software.
- 9. A secret combination of characters used to access a system.
- 10. A type of malware that locks files and demands payment for decryption.
Down
- 1. A security system that monitors and controls incoming and outgoing network traffic.
- 4. The process of converting data into a secure code to prevent unauthorized access.
- 7. Software that detects and removes malicious programs.
- 8. A person who gains unauthorized access to computer systems.
