Across
- 1. Weakness or flaw in a system that can be exploited by attackers.
- 5. Science of secure communication using codes and ciphers.
- 8. Isolated environment used for testing potentially malicious software.
- 9. Authentication method that uses unique physical or behavioral characteristics.
- 13. Software designed to harm or exploit computer systems.
- 14. Process of verifying the identity of a user or s
- 16. Virtual Private Network that provides secure and private communication over public networks.
- 18. Decoy system designed to attract and monitor unauthorized access attempts.
- 19. Network security device that monitors and filters incoming and outgoing network traffic.
- 20. Measures taken to protect computer systems and data from unauthorized access or attacks.
- 21. A secret word or phrase used for authentication and access control.
- 22. Malicious code that replicates itself and infects computer systems.
Down
- 2. Unauthorized access to computer systems or networks.
- 3. Distributed Denial of Service attack that overwhelms a target system with traffic.
- 4. Vulnerability or exploit that is unknown to software developers or security researchers.
- 6. Cyber attack method that tricks users into revealing sensitive information.
- 7. Process of converting information into a secret code to prevent unauthorized access.
- 10. Malicious software that disguises itself as legitimate software.
- 11. A hidden entry point into a system that bypasses normal security mechanisms.
- 12. Criminal activities conducted over the internet.
- 15. A person who uses their programming skills to gain unauthorized access to computer systems.
- 17. Malicious software that encrypts files and demands a ransom for their release.
- 21. Software update that fixes security vulnerabilities.