BrainRiddle
Across
- 2. A cryptographic function that converts data into a fixed-size string.
- 5. A vulnerability in software that is exploited before the developer fixes it.
- 6. A type of malware that secretly gathers information from a user’s device.
- 7. The process of securing data by converting it into an unreadable format.
- 9. A cyber-attack where attackers trick users into revealing sensitive information.
- 11. A type of malware that disguises itself as legitimate software.
- 13. A hidden part of the internet where anonymous activities take place.
- 14. A network of infected computers controlled remotely by hackers.
- 15. A network security system that monitors and controls incoming and outgoing traffic.
Down
- 1. A type of software designed to harm or exploit devices and networks.
- 3. A hacking method that tries multiple password combinations to gain access.
- 4. The act of manipulating people into revealing confidential
- 8. A cyber attack that manipulates databases through malicious SQL queries.
- 10. Malicious software that locks files and demands payment to restore access.
- 12. A set of tools that allow hackers to maintain access to a system unnoticed.