CS Month Week 4
Across
- 2. Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.
- 4. List of approved entities, such as IP addresses or applications, allowed access to a network or system, enhancing security.
- 5. Malicious code or software delivered as part of an attack, causing harm once executed.
- 6. Unauthorized interception of private conversations or data transmission, often accomplished through network monitoring.
- 7. Software designed to detect, prevent, and remove malicious software from a computer or network.
Down
- 1. Ethical Hacker who identifies security vulnerabilities to help organizations improve their systems’ defenses.
- 3. Authentication method using unique physical or behavioral traits (fingerprint, facial recognition) for identity verification.
- 5. Cyber attack that redirects users from legitimate websites to fake ones, often for the purpose of collecting data.