Security
Across
- 2. A type of malware that records keystrokes to steal sensitive data.
- 3. A technique where an attacker sends fraudulent emails to steal sensitive information.
- 7. A network device that filters incoming and outgoing traffic based on security rules.
- 9. The process of disguising data within an image or another file to hide its presence.
- 13. A wireless attack that involves setting up a fraudulent Wi-Fi access point.
- 14. An attack that overloads a system with excessive requests, making it unavailable.
- 15. A network of compromised computers controlled remotely by an attacker.
- 16. An attack where an unauthorized person intercepts communication between two parties.
- 19. An attack where an unauthorized user gains access by following an authorized user.
Down
- 1. A cryptographic attack that attempts to find two different inputs producing the same hash.
- 4. A social engineering technique where an attacker manipulates victims by creating a sense of urgency.
- 5. Software that automatically displays or downloads advertisements, often without user consent.
- 6. Software that secretly gathers information about a user without their knowledge.
- 8. The process of confirming a user’s identity before granting access.
- 10. A type of malware that enables persistent, unauthorized access to a computer.
- 11. The principle that ensures only authorized users can access certain data.
- 12. A type of malware that locks users out of their system until a payment is made.
- 17. A malicious program that disguises itself as legitimate software.
- 18. A security protocol that provides encrypted communication over a computer network.