Security

12345678910
Across
  1. 6. A scam where attackers pretend to be a trusted entity to steal information.
  2. 7. Malicious software designed to gather user information without consent.
  3. 9. A malicious program designed to damage or destroy data.
  4. 10. A systematic approach to solving computer problems.
Down
  1. 1. A duplicate copy of important files for safeguarding against data loss.
  2. 2. The process of converting data into an unreadable form for security.
  3. 3. A string of characters used to secure user accounts.
  4. 4. A secure connection that allows remote access to a private network.
  5. 5. A security barrier that filters and controls network traffic.
  6. 8. A program that appears harmless but allows hackers remote access.