BrainRiddle

123456789101112131415
Across
  1. 2. A cryptographic function that converts data into a fixed-size string.
  2. 5. A vulnerability in software that is exploited before the developer fixes it.
  3. 6. A type of malware that secretly gathers information from a user’s device.
  4. 7. The process of securing data by converting it into an unreadable format.
  5. 9. A cyber-attack where attackers trick users into revealing sensitive information.
  6. 11. A type of malware that disguises itself as legitimate software.
  7. 13. A hidden part of the internet where anonymous activities take place.
  8. 14. A network of infected computers controlled remotely by hackers.
  9. 15. A network security system that monitors and controls incoming and outgoing traffic.
Down
  1. 1. A type of software designed to harm or exploit devices and networks.
  2. 3. A hacking method that tries multiple password combinations to gain access.
  3. 4. The act of manipulating people into revealing confidential
  4. 8. A cyber attack that manipulates databases through malicious SQL queries.
  5. 10. Malicious software that locks files and demands payment to restore access.
  6. 12. A set of tools that allow hackers to maintain access to a system unnoticed.