Across
- 2. The process of encoding information in such a way that only authorized parties can access it
- 7. The practice of protecting systems, networks, and programs from digital attacks
- 8. A person who uses computers to gain unauthorized access to data.
- 9. The state of being exposed to the possibility of being attacked or harmed, either physically or emotionally. In cybersecurity, a weakness that can be exploited.
- 10. Short for "malicious software," it's any software intentionally designed to cause damage to a computer, server, client, or computer network
Down
- 1. A type of malicious software designed to block access to a computer system until a sum of money is paid
- 3. Software used to prevent, detect, and remove malicious software
- 4. The process of decoding
- 5. An attempt by hackers to damage or destroy a computer network or system
- 6. This is perhaps the most ubiquitous prefix in the field, indicating anything related to computers, networks, or the internet.
- 8. The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.
