Across
- 2. security systems that monitor and control incoming and outgoing network traffic, acting as a barrier between a trusted internal network and external threats, such as hackers or malware.
- 4. malicious software designed to secretly monitor and collect information from a device without the user's consent
- 6. ethical hackers who use their skills to identify and fix security vulnerabilities in systems, often working with organizations to improve security and protect against cyber threats.
- 7. a malicious software designed to damage, disrupt, or gain unauthorized access to computers, networks, or devices. This includes viruses.
- 10. networks of compromised devices (often called bots or zombies) that are controlled remotely by cybercriminals to carry out malicious activities
Down
- 1. individuals who illegally hack into systems or networks with malicious intent, such as stealing data, spreading malware, or causing damage. They operate outside the law for personal gain or to cause harm
- 3. the process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can decrypt and read the original information.
- 5. a tactic used by cybercriminals to manipulate people into revealing sensitive information by exploiting trust or emotions, rather than using technical methods.
- 8. a type of cyberattack where attackers impersonate legitimate organizations or individuals to deceive people into revealing sensitive information, such as passwords, credit card numbers, or personal details, usually via email, text messages, or fake websites.
- 9. a cyberattack where multiple compromised computers or devices are used to flood a target server, website, or network with excessive traffic, overwhelming it and causing it to become slow, unresponsive, or crash. The goal is to disrupt access to the targeted service.
