Security

12345678910111213141516171819
Across
  1. 2. A type of malware that records keystrokes to steal sensitive data.
  2. 3. A technique where an attacker sends fraudulent emails to steal sensitive information.
  3. 7. A network device that filters incoming and outgoing traffic based on security rules.
  4. 9. The process of disguising data within an image or another file to hide its presence.
  5. 13. A wireless attack that involves setting up a fraudulent Wi-Fi access point.
  6. 14. An attack that overloads a system with excessive requests, making it unavailable.
  7. 15. A network of compromised computers controlled remotely by an attacker.
  8. 16. An attack where an unauthorized person intercepts communication between two parties.
  9. 19. An attack where an unauthorized user gains access by following an authorized user.
Down
  1. 1. A cryptographic attack that attempts to find two different inputs producing the same hash.
  2. 4. A social engineering technique where an attacker manipulates victims by creating a sense of urgency.
  3. 5. Software that automatically displays or downloads advertisements, often without user consent.
  4. 6. Software that secretly gathers information about a user without their knowledge.
  5. 8. The process of confirming a user’s identity before granting access.
  6. 10. A type of malware that enables persistent, unauthorized access to a computer.
  7. 11. The principle that ensures only authorized users can access certain data.
  8. 12. A type of malware that locks users out of their system until a payment is made.
  9. 17. A malicious program that disguises itself as legitimate software.
  10. 18. A security protocol that provides encrypted communication over a computer network.