BrainRiddle

123456789101112131415
Across
  1. 4. The process of verifying the identity of a user or system.
  2. 9. The study of analyzing and breaking cryptographic algorithms.
  3. 10. The process of removing software restrictions on a device to gain full control.
  4. 12. The practice of updating software to fix security vulnerabilities.
  5. 13. A security feature ensuring only trusted software runs during startup.
  6. 14. The process of identifying, managing, and mitigating cybersecurity threats.
  7. 15. The process of collecting and analyzing data to prevent cyber threats.
Down
  1. 1. A cyberattack where an attacker secretly intercepts communication.
  2. 2. A cryptographic technique used to verify the authenticity of data.
  3. 3. The use of hacking techniques for political or social activism.
  4. 5. A program or code that takes advantage of a vulnerability in a system.
  5. 6. A hidden method of bypassing security controls to gain unauthorized access.
  6. 7. Software embedded in hardware that controls low-level device operations.
  7. 8. An advanced computing paradigm that can break classical encryption.
  8. 11. A type of malware that records keystrokes to steal passwords and data.