Across
- 4. Memory exploit attack
- 5. Cross-site request forgery attack
- 7. Controlled network of bots
- 9. Secret entry to a computer system
- 10. Network packet interception tool
- 13. Secure data handling method
- 14. Data fingerprinting technique
- 15. Intrusion detection system
Down
- 1. Monitoring software for keystrokes
- 2. Data or code hiding technique
- 3. Breaking of cryptographic codes
- 6. Impersonation attack
- 8. Encapsulating network protocol method
- 11. Automated bug testing method
- 12. Remote access malware
