Across
- 2. extends a private network across a public network and enables users to send and receive data across shared or public networks
- 7. a type of malicious program (malware) that encrypts data so the victim can’t access it without the decryption key. To get one, the victim must pay a ransom, usually within a designated period.
- 8. relates to processes employed to safeguard and secure assets used to carry information of an organization from being stolen or attacked
- 9. Breach of a system's security policy in order to affect its integirty or availability
- 10. any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage
Down
- 1. a process of maintaining data confidentiality by converting plain data into a secret code with the help of an encryption algorithm.
- 3. name commonly given to unsolicited email.
- 4. contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.
- 5. a type of self-replicating malware that, when infected on a computer, is aimed to spread across the network to infect others.
- 6. Good guys in the world of cybercrime. Hackers who use their skills and talents for good