#PreventionStartsWithUs Crossword Puzzle

12345678910
Across
  1. 2. What is the practice of disguising information to make it unreadable by unauthorized individuals?
  2. 4. What is the most popular IDE among automation developers?
  3. 7. What operating system was Rpm Arming designed for?
  4. 8. A virus that encrypts your data and you have to pay to receive the encryption key.
  5. 10. What is the term for a type of cyber attack that targets vulnerabilities in web applications, often through injecting malicious code?
Down
  1. 1. This type of malware uses a combination of encryption, evasion techniques, and anti-analysis mechanisms to avoid detection and analysis.
  2. 3. What is the practice of manipulating or falsifying data to deceive or mislead computer systems or users?
  3. 5. Software that is designed to interfere with a computerʼs normal functioning and that can be used to commit cyber crime.
  4. 6. A former name for DPA
  5. 9. What is the term for a type of cyber attack that involves sending an overwhelming amount of traffic to a target system to disrupt its normal functioning?