Across
- 3. A bot-challenging security feature for online interactions.
- 4. Code to fix or enhance software.
- 6. Captures keystrokes to gather sensitive information.
- 8. Security solution to analyze and detect threats in real-time from diverse data and events.
- 9. Collaboration integrating security, automation, and shared responsibility in software development.
- 10. Harmful software for gathering information without consent.
- 12. A stealthy malware granting unauthorized system access while concealing actions.
- 13. Network of devices used for malware distribution, and cyber-attacks.
Down
- 1. Email attachments from unknown senders.
- 2. A way to bypass authentication, used for unauthorized access or malicious intent.
- 5. The most common word used for brute force.
- 7. Safeguard sensitive files and communications.
- 8. Isolated environment to analyze software behavior.
- 11. A U.S. federal agency promoting cybersecurity standards and innovation.