Across
- 3. It is a way to scramble data so that only authorized parties can unscramble it.
- 4. It is software that is installed on a computer without the user's consent and that performs malicious actions, such as stealing passwords or money.
- 5. It is a type of malicious software that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return
Down
- 1. It is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication.
- 2. It is a network security device that monitors traffic to or from your network. It allows or blocks traffic based on a defined set of security rules.
