Cybersecurity

12345678910
Across
  1. 2. Software that secretly gathers information about a person or organization without their knowledge.
  2. 4. The process of converting data into a coded format to prevent unauthorized access.
  3. 7. A security system that monitors and controls incoming and outgoing network traffic based on predetermined rules.
  4. 8. Malicious software designed to harm, exploit, or otherwise compromise a computer or network.
  5. 9. A software update designed to fix vulnerabilities or bugs in a program or system.
  6. 10. A network of infected devices controlled remotely by an attacker, often used for large-scale attacks.
Down
  1. 1. The method of verifying the identity of a user, device, or system before granting access.
  2. 3. A type of malware disguised as legitimate software to trick users into installing it.
  3. 5. A type of cyberattack where attackers trick users into revealing sensitive information through deceptive emails or messages.
  4. 6. Malware that locks or encrypts a victim’s data and demands payment for its release.