תשחץ החודש

123456789101112131415
Across
  1. 4. Memory exploit attack
  2. 5. Cross-site request forgery attack
  3. 7. Controlled network of bots
  4. 9. Secret entry to a computer system
  5. 10. Network packet interception tool
  6. 13. Secure data handling method
  7. 14. Data fingerprinting technique
  8. 15. Intrusion detection system
Down
  1. 1. Monitoring software for keystrokes
  2. 2. Data or code hiding technique
  3. 3. Breaking of cryptographic codes
  4. 6. Impersonation attack
  5. 8. Encapsulating network protocol method
  6. 11. Automated bug testing method
  7. 12. Remote access malware