Puzzle - 6

12345678910
Across
  1. 2. extends a private network across a public network and enables users to send and receive data across shared or public networks
  2. 7. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
  3. 8. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
  4. 9. Breach of a system's security policy in order to affect its integirty or availability
  5. 10. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
  1. 1. a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
  2. 3. name commonly given to unsolicited email.
  3. 4. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
  4. 5. a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
  5. 6. Good guys in the world of cybercrime. Hackers who use their skills and talents for good