Across
- 1. The process of converting data into a secret code to prevent unauthorized access.
- 5. A type of malware disguised as legitimate software to trick users into installing it.
- 6. A cyberattack that overwhelms a website with traffic to make it unavailable.
- 9. A secret combination of characters used to access accounts securely.
- 11. Malicious software designed to harm or exploit computer systems.
- 12. A security process requiring two verification methods to access an account.
- 13. A program that detects and removes malicious software.
- 14. Criminal activities carried out using computers or the internet.
- 15. A security system that monitors and controls incoming and outgoing network traffic.
Down
- 2. Malicious software that locks a userβs files and demands payment for their release.
- 3. Manipulating people into giving up confidential information.
- 4. A person who gains unauthorized access to computer systems.
- 7. An incident where sensitive information is accessed without authorization.
- 8. A cyberattack that tricks people into revealing personal information through fake emails or websites.
- 10. A type of malware that secretly gathers information about a person or organization.
