Across
- 6. A scam where attackers pretend to be a trusted entity to steal information.
- 7. Malicious software designed to gather user information without consent.
- 9. A malicious program designed to damage or destroy data.
- 10. A systematic approach to solving computer problems.
Down
- 1. A duplicate copy of important files for safeguarding against data loss.
- 2. The process of converting data into an unreadable form for security.
- 3. A string of characters used to secure user accounts.
- 4. A secure connection that allows remote access to a private network.
- 5. A security barrier that filters and controls network traffic.
- 8. A program that appears harmless but allows hackers remote access.
