apples and biscuits

1234567891011121314151617181920
Across
  1. 5. A system designed to detect unauthorized access or misuse within a network.
  2. 6. A method used to crack passwords by trying every possible combination of characters.
  3. 7. An email or message that tricks the recipient into providing sensitive information.
  4. 8. A security protocol for establishing encrypted links between a web server and a browser.
  5. 10. A type of attack where an intruder gains unauthorized access to a network by pretending to be a trusted entity.
  6. 11. A file containing instructions for malicious activities, often disguised as a legitimate program.
  7. 13. A software that tracks and records every keystroke made on a computer.
  8. 14. The process of converting information into a code to prevent unauthorized access.
  9. 15. The concept of allowing only authorized individuals to access information.
  10. 18. A network of compromised computers controlled by an attacker.
  11. 19. A framework for securing information through physical, technical, and administrative measures.
  12. 20. A weakness in a system that can be exploited by attackers.
Down
  1. 1. A type of malware that encrypts a victim's files, demanding payment to restore access.
  2. 2. A security measure used to protect a system by filtering incoming and outgoing traffic.
  3. 3. An encrypted code that allows you to execute secure transactions over the internet.
  4. 4. A malicious software that replicates itself and spreads to other computers.
  5. 9. An attack that redirects a website's traffic to a fraudulent website.
  6. 12. A test designed to find vulnerabilities by simulating an attack on a system.
  7. 16. A technique used by attackers to overwhelm a target system with a flood of requests.
  8. 17. The practice of ensuring data is not altered or tampered with.