Across
- 4. The day that software vendors release regular security updates.
- 6. Authentication based on unique physical or behavioral traits.
- 11. Malware that encrypts data and demands a ransom for decryption.
- 12. Unauthorized interception of communication.
- 13. Software designed to detect and remove viruses and other malware.
- 14. Malware that provides unauthorized access while concealing its presence.
- 15. Software or hardware that records keystrokes without authorization.
Down
- 1. A software update that fixes security vulnerabilities.
- 2. Illegally using a computer's resources to mine cryptocurrency.
- 3. A network of infected computers controlled by a single entity.
- 5. A decoy system designed to attract and trap attackers.
- 7. An attack that involves trying every possible combination to crack a password
- 8. The malicious part of software responsible for harmful actions.
- 9. Capturing and analyzing network traffic without authorization.
- 10. The process of converting data into a code to prevent unauthorized access.