Across
- 1. Malicious software designed to harm or exploit computer systems
- 4. Malware disguised as legitimate software, used to gain unauthorized access
- 6. The process of converting data into a coded form to prevent unauthorized access
- 8. A type of cyber attack where attackers trick users into revealing sensitive information
Down
- 2. The process of verifying the identity of a user or device
- 3. A network security system that monitors and controls incoming and outgoing traffic
- 5. Copying data to prevent loss in case of system failure or attack
- 7. A type of malware that can replicate itself and spread to other computers
