Cyber security

123456789101112
Across
  1. 7. An example is a key logger
  2. 8. Type of test where someone tries to hack into a network
  3. 11. Physical features used to authenticate users
  4. 12. Finding login details by watching someone enter them
Down
  1. 1. Using a scenario to persuade a victim to divulge information
  2. 2. Hidden inside legitimate looking software
  3. 3. Using fake emails to gain information
  4. 4. A physical attribute used to authenticate a user
  5. 5. Any kind of malicious program
  6. 6. A form of challenge-response test to check that a user is human
  7. 8. Redirection to a fake website
  8. 9. Used when logging into a computer or network
  9. 10. Requires user action to spread