Cyber security

123456789
Across
  1. 2. An important process that verifies a user is really who they are; many different ways this can be done
  2. 4. I am not a robot
  3. 5. A technique used typically to guess a password by trying every single combination in order without much extra thought or effort; usually only breaks weak passwords (two words)
  4. 6. a collection of malware infested computers that form a network to attack
  5. 8. A bit of malicious code that attaches itself to files and attempts to replicate itself; can be removed if its definition is known
  6. 9. Ethical hacking in order to find any cybersecurity weaknesses is known as _____testing.
Down
  1. 1. Full name of DoS attack
  2. 2. An annoying malware that spams you with ads
  3. 3. When raw data is put into context and has meaning, the data transforms into _____
  4. 7. Malicious code that does not need to be attached to a file and runs independently, replicating itself across systems and consuming system and network resources.