Ethical hacking

1234567891011121314
Across
  1. 3. Hidden entry point into a system bypassing security
  2. 7. Software that secretly monitors user activity
  3. 8. Fraudulent attempt to obtain sensitive information via email
  4. 9. Process of converting data into a coded format
  5. 10. Security barrier that controls incoming and outgoing network traffic
  6. 11. Malicious software designed to harm or exploit devices
  7. 13. Tool that records keystrokes to steal information
  8. 14. Self-replicating program that infects computers
Down
  1. 1. Malware disguised as legitimate software
  2. 2. Malware that locks files until a payment is made
  3. 4. Weakness in a system that can be exploited by hackers
  4. 5. Person who gains unauthorized access to systems
  5. 6. Process of gathering information about a target system
  6. 8. Testing method used to find vulnerabilities in a system
  7. 12. Malware that spreads across networks without user action