Cyber Security
Across
- 5. – A system designed to block unauthorized access (8)
- 7. – Testing method to evaluate security defenses (11)
- 8. – Software designed to disrupt or damage systems (7)
- 9. – Digital document proving ownership of a public key (11)
- 11. – Distributed attack that overwhelms a system with traffic (4)
- 12. – Fraudulent attempt to obtain sensitive information (8)
- 13. – Malware that demands payment to restore access (10)
Down
- 1. – Software that secretly monitors user activity (7)
- 2. – Process of converting data into a code (10)
- 3. – A weakness in a system that can be exploited (13)
- 4. force – Attack method involving trial and error (10)
- 6. – Process of converting data into a fixed-size value (7)
- 10. – A type of malware disguised as legitimate software (6)