Cybersecurity Crossword Challenge

123456789
Across
  1. 2. Software that secretly monitors user activity and collects personal information.
  2. 4. A technique where a fake email or website is used to look like a trusted source.
  3. 5. Software designed to harm or exploit any device it infects.
  4. 7. When sensitive information is exposed due to a cyberattack or leak.
  5. 8. A scam where attackers trick you into sharing personal information.
  6. 9. A network security system that monitors and controls incoming and outgoing traffic.
Down
  1. 1. Malware that locks your files and demands payment.
  2. 3. A tool that encrypts your internet connection, often used for secure browsing.
  3. 6. The process of scrambling data to keep it secure from unauthorized access.