CS Month Week 4

1234567
Across
  1. 2. Unethical hacker who exploits vulnerabilities for personal gain or malicious intent.
  2. 4. List of approved entities, such as IP addresses or applications, allowed access to a network or system, enhancing security.
  3. 5. Malicious code or software delivered as part of an attack, causing harm once executed.
  4. 6. Unauthorized interception of private conversations or data transmission, often accomplished through network monitoring.
  5. 7. Software designed to detect, prevent, and remove malicious software from a computer or network.
Down
  1. 1. Ethical Hacker who identifies security vulnerabilities to help organizations improve their systems’ defenses.
  2. 3. Authentication method using unique physical or behavioral traits (fingerprint, facial recognition) for identity verification.
  3. 5. Cyber attack that redirects users from legitimate websites to fake ones, often for the purpose of collecting data.