Across
- 3. an analysis of an applications source code
- 5. a piece of code that takes advantage of a vulnerability
- 6. software designed to cause harm
- 8. a vulnerability that is currently unknown
- 10. a technique used by hackers to gain sensitive information
- 12. malware that holds your data hostage
Down
- 1. collection of web or internet based pages
- 2. when a system has false requests that causes it to crash
- 4. impersonating another use or device on a network
- 7. encoding software for authorized access only
- 9. hardware or software that blocks viruses
- 11. when a hacker gains access to files and network