CIS178 Participation3-Security Crossword

123456789101112131415161718
Across
  1. 2. Deliberate theft of sensitive data
  2. 3. Hacker successfully exploits network/device
  3. 5. Hidden secuity bypass in code
  4. 6. Waknesses in software hackers exploit
  5. 9. Challenge-response test verifying humanity
  6. 12. Temporary, first-party, third-party
  7. 14. Capture data submitted over network
  8. 15. Website names into machine addresses
  9. 16. Confirming a user's identity
  10. 18. Software installed without user consent
Down
  1. 1. Holds files hostage for money
  2. 3. Audio/video changed for credibility
  3. 4. Personal devices used for work
  4. 5. Malicious computers controlled remotely
  5. 7. Public, private, static, dynamic
  6. 8. Commonplace items connected to internet
  7. 10. Shield user againse harmful spyware
  8. 11. Fraudulent messages for personal gain
  9. 13. Adventatious malicious code attacking vulnerabilities
  10. 17. Monitors and filters network traffic