CyberSecurity

123456789101112
Across
  1. 2. Malware that disguises itself as legitimate software (6)
  2. 4. A team or center that monitors and defends against cyber threats (3)
  3. 5. A person who gains unauthorized access to systems (6)
  4. 8. Fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity (8)
  5. 9. Software update to fix vulnerabilities (5)
  6. 10. Malicious code that replicates itself by attaching to files (5)
  7. 12. Malware that encrypts files and demands payment to restore access (10)
Down
  1. 1. Technique used to convert data into unreadable form for security (10)
  2. 3. A network of infected devices used for cyber attacks (6)
  3. 6. Software that secretly gathers user information without consent (7)
  4. 7. Security system that monitors and controls incoming and outgoing network traffic (8)
  5. 11. Security method requiring multiple verification steps (3)