Across
- 4. A cyberattack where fake QR codes trick users into visiting malicious sites.
- 6. A cyberattack that tricks users into clicking hidden elements.
- 7. A tool that protects a network by blocking suspicious traffic.
- 10. A method used to avoid security restrictions.
- 12. When private data is exposed to unauthorized people.
- 14. An attack where a hacker takes control of an active user session.
- 15. A weakness in software that hackers can exploit.
Down
- 1. A method of guessing passwords by trying many combinations.
- 2. A small software update that fixes security flaws.
- 3. A cybersecurity event that may cause harm to systems.
- 5. A physical or digital device used for secure authentication.
- 8. Files that store records of activity on a system.
- 9. A username and password used for authentication.
- 11. A type of malware that bombards users with unwanted ads.
- 13. A security method that requires two types of authentication.
