Cybersecurity
Across
- 1. Malicious computer software
- 6. records or transmits a user's keystrokes
- 8. secure time-limited credential
- 9. take advantage of a particular error
- 10. used to flood a target server
Down
- 2. software tools used by a third party
- 3. possible source of harm
- 4. network of maliciously installed bots
- 5. injecting malicious scripts into legitimate web pages
- 7. bypassing normal authentication or security mechanisms