Across
- 2. – A system that blocks unauthorized access to a network.
- 3. – Someone who exploits system vulnerabilities.
- 6. – Malware that locks your files and demands payment.
- 9. – Malware disguised as legitimate software.
- 11. – Converting data into a secure code to prevent access.
- 13. – Fraudulent attempt to obtain sensitive information online.
Down
- 1. – Unauthorized access to data or a system.
- 4. – Program that detects and removes malware.
- 5. – Software that secretly monitors your activity.
- 7. – Software designed to harm or exploit a computer.
- 8. – A program that spreads and damages files or systems.
- 10. – Network of infected computers controlled remotely.
- 12. – Secret word or phrase used for authentication.
- 13. – Software update that fixes security issues.
