Ethical Hacking CrossWord Puzzle by Megaa M

123456789101112131415
Across
  1. 2. Character string, often protected by hashing, required for system entry​
  2. 8. Malicious actor breaching security for personal gain or disruption​
  3. 10. Simulating covert and authorized intrusions to assess system fortitude​
  4. 13. Multi-layered process confirming user legitimacy within a secure environment​
  5. 15. Systematic flaw that adversaries actively seek to compromise​
Down
  1. 1. Distributed technique that overwhelms network resources, halting normal activity​
  2. 3. Psychological manipulation of individuals to divulge confidential details​
  3. 4. Deceptive social engineering tactic exploiting user trust to harvest credentials​
  4. 5. Hidden digital threat capable of data exfiltration or destruction upon execution​
  5. 6. Tool for scanning networks and discovering open ports
  6. 7. Professional hacker conducting authorized assessments to bolster cyber defenses​
  7. 9. powerful framework used for developing,testing and exploits
  8. 11. Malicious software masquerading as useful program to infiltrate the system​
  9. 12. Acts as a barricade, filtering suspicious packets from entering trusted zones​
  10. 14. Uses complex algorithms to render sensitive data unreadable to unauthorized eyes​