Across
- 2. Deliberate theft of sensitive data
- 3. Hacker successfully exploits network/device
- 5. Hidden secuity bypass in code
- 6. Waknesses in software hackers exploit
- 9. Challenge-response test verifying humanity
- 12. Temporary, first-party, third-party
- 14. Capture data submitted over network
- 15. Website names into machine addresses
- 16. Confirming a user's identity
- 18. Software installed without user consent
Down
- 1. Holds files hostage for money
- 3. Audio/video changed for credibility
- 4. Personal devices used for work
- 5. Malicious computers controlled remotely
- 7. Public, private, static, dynamic
- 8. Commonplace items connected to internet
- 10. Shield user againse harmful spyware
- 11. Fraudulent messages for personal gain
- 13. Adventatious malicious code attacking vulnerabilities
- 17. Monitors and filters network traffic
