apples and biscuits
Across
- 5. A system designed to detect unauthorized access or misuse within a network.
- 6. A method used to crack passwords by trying every possible combination of characters.
- 7. An email or message that tricks the recipient into providing sensitive information.
- 8. A security protocol for establishing encrypted links between a web server and a browser.
- 10. A type of attack where an intruder gains unauthorized access to a network by pretending to be a trusted entity.
- 11. A file containing instructions for malicious activities, often disguised as a legitimate program.
- 13. A software that tracks and records every keystroke made on a computer.
- 14. The process of converting information into a code to prevent unauthorized access.
- 15. The concept of allowing only authorized individuals to access information.
- 18. A network of compromised computers controlled by an attacker.
- 19. A framework for securing information through physical, technical, and administrative measures.
- 20. A weakness in a system that can be exploited by attackers.
Down
- 1. A type of malware that encrypts a victim's files, demanding payment to restore access.
- 2. A security measure used to protect a system by filtering incoming and outgoing traffic.
- 3. An encrypted code that allows you to execute secure transactions over the internet.
- 4. A malicious software that replicates itself and spreads to other computers.
- 9. An attack that redirects a website's traffic to a fraudulent website.
- 12. A test designed to find vulnerabilities by simulating an attack on a system.
- 16. A technique used by attackers to overwhelm a target system with a flood of requests.
- 17. The practice of ensuring data is not altered or tampered with.