Across
- 4. The process of verifying the identity of a user or system.
- 9. The study of analyzing and breaking cryptographic algorithms.
- 10. The process of removing software restrictions on a device to gain full control.
- 12. The practice of updating software to fix security vulnerabilities.
- 13. A security feature ensuring only trusted software runs during startup.
- 14. The process of identifying, managing, and mitigating cybersecurity threats.
- 15. The process of collecting and analyzing data to prevent cyber threats.
Down
- 1. A cyberattack where an attacker secretly intercepts communication.
- 2. A cryptographic technique used to verify the authenticity of data.
- 3. The use of hacking techniques for political or social activism.
- 5. A program or code that takes advantage of a vulnerability in a system.
- 6. A hidden method of bypassing security controls to gain unauthorized access.
- 7. Software embedded in hardware that controls low-level device operations.
- 8. An advanced computing paradigm that can break classical encryption.
- 11. A type of malware that records keystrokes to steal passwords and data.
