Information Security Crossword

12345678910111213
Across
  1. 2. An attack that exploits software flaws before developers can release a patch or fix.
  2. 4. The process of confirming the identity of a user, typically before granting access to resources.
  3. 7. An unauthorized action that exposes, steals, or compromises data from a system.
  4. 9. The process of testing a system, network, or web application to find security vulnerabilities.
  5. 11. A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
  6. 12. A security mechanism that prevents unauthorized access to a network by filtering traffic.
  7. 13. A type of malicious software designed to gain unauthorized access to a computer system.
Down
  1. 1. A program that secretly records everything typed on a computer, usually for malicious purposes.
  2. 3. A cyberattack where the perpetrator floods a server with excessive traffic
  3. 5. A malicious attack where data is encrypted by criminals to demand payment for its release.
  4. 6. Which term is used to describe the “cargo” that malware brings with it when it infects a device?
  5. 8. What is a term for a group of computers that is networked together and used by hackers to steal information?
  6. 10. A malicious program disguised as legitimate software, often used to gain unauthorized access.