CLD

1234567891011121314151617181920212223242526272829
Across
  1. 2. Software designed to hide malicious activities
  2. 4. Impersonation of a device or user
  3. 11. Code that takes advantage of a vulnerability
  4. 13. Decoy system to lure attackers
  5. 14. Isolated environment for running suspicious programs
  6. 17. Security system that controls network traffic
  7. 18. Method of guessing passwords using all possible combinations
  8. 21. Extra layer of security using two forms of authentication
  9. 22. Attack that overwhelms a system with traffic
  10. 23. Malicious code that replicates itself
  11. 25. Tool that records keystrokes
  12. 27. Software update to fix vulnerabilities
  13. 28. Malicious software designed to harm
  14. 29. Malware that locks files for a ransom
Down
  1. 1. Process of converting data into a secure format
  2. 3. Targeted phishing attack
  3. 5. Hidden entry point into a system
  4. 6. Testing security by simulating an attack
  5. 7. Type of malware disguised as legitimate software
  6. 8. Software that detects and removes malware
  7. 9. Group of interconnected devices
  8. 10. Relating to computers and networks
  9. 12. Network of infected devices under remote control
  10. 13. Process of converting data into a fixed-size string
  11. 15. Vulnerability unknown to the software maker
  12. 16. Algorithm for performing encryption or decryption
  13. 19. Network security system
  14. 20. Self-replicating malware that spreads without human intervention
  15. 24. Software that secretly gathers user information
  16. 26. Fraudulent attempt to obtain sensitive information