Expert

12345678910
Across
  1. 3. A software fix that addresses a security vulnerability.
  2. 5. Malware that encrypts your files and demands payment.
  3. 6. An authentication method requiring two or more factors.
  4. 7. A secure, isolated environment for testing code.
  5. 9. A device that connects to a network.
  6. 10. A security protocol that eliminates passwords.
Down
  1. 1. A method where malicious code is inserted into a query.
  2. 2. The person or group responsible for an attack.
  3. 4. Measures taken to prevent or respond to threats.
  4. 8. Unauthorized access into a system.