Across
- 1. A system that translates domain names to IP addresses.
- 3. A tool that encrypts internet connections for privacy.
- 5. A team that monitors and defends against cyber threats.
- 11. A method of hiding data within other files.
- 12. The data sent back from a server after a request.
- 13. A remote computing device that communicates with a network.
- 14. A program where hackers get paid for finding security flaws.
Down
- 2. A temporary interaction between a user and a website.
- 4. The part of a cyber attack that carries malicious code.
- 6. A security feature that controls web resource access.
- 7. A process of converting data into a fixed-size value.
- 8. A temporary storage to speed up data access.
- 9. A set of rules for communication between software.
- 10. A type of attack that tricks users into executing unwanted actions.
- 11. A file containing code for automation.
