Ethical hacking
Across
- 3. Hidden entry point into a system bypassing security
- 7. Software that secretly monitors user activity
- 8. Fraudulent attempt to obtain sensitive information via email
- 9. Process of converting data into a coded format
- 10. Security barrier that controls incoming and outgoing network traffic
- 11. Malicious software designed to harm or exploit devices
- 13. Tool that records keystrokes to steal information
- 14. Self-replicating program that infects computers
Down
- 1. Malware disguised as legitimate software
- 2. Malware that locks files until a payment is made
- 4. Weakness in a system that can be exploited by hackers
- 5. Person who gains unauthorized access to systems
- 6. Process of gathering information about a target system
- 8. Testing method used to find vulnerabilities in a system
- 12. Malware that spreads across networks without user action