Expert
Across
- 3. A software fix that addresses a security vulnerability.
- 5. Malware that encrypts your files and demands payment.
- 6. An authentication method requiring two or more factors.
- 7. A secure, isolated environment for testing code.
- 9. A device that connects to a network.
- 10. A security protocol that eliminates passwords.
Down
- 1. A method where malicious code is inserted into a query.
- 2. The person or group responsible for an attack.
- 4. Measures taken to prevent or respond to threats.
- 8. Unauthorized access into a system.