Across
- 2. Software designed to hide malicious activities
- 4. Impersonation of a device or user
- 11. Code that takes advantage of a vulnerability
- 13. Decoy system to lure attackers
- 14. Isolated environment for running suspicious programs
- 17. Security system that controls network traffic
- 18. Method of guessing passwords using all possible combinations
- 21. Extra layer of security using two forms of authentication
- 22. Attack that overwhelms a system with traffic
- 23. Malicious code that replicates itself
- 25. Tool that records keystrokes
- 27. Software update to fix vulnerabilities
- 28. Malicious software designed to harm
- 29. Malware that locks files for a ransom
Down
- 1. Process of converting data into a secure format
- 3. Targeted phishing attack
- 5. Hidden entry point into a system
- 6. Testing security by simulating an attack
- 7. Type of malware disguised as legitimate software
- 8. Software that detects and removes malware
- 9. Group of interconnected devices
- 10. Relating to computers and networks
- 12. Network of infected devices under remote control
- 13. Process of converting data into a fixed-size string
- 15. Vulnerability unknown to the software maker
- 16. Algorithm for performing encryption or decryption
- 19. Network security system
- 20. Self-replicating malware that spreads without human intervention
- 24. Software that secretly gathers user information
- 26. Fraudulent attempt to obtain sensitive information
