Across
- 4. Confidentiality, Integrity, and Availability security triad.
- 5. Malicious software that can harm systems.
- 6. Potential cause of an unwanted incident.
- 9. Pretending to be another device or user.
- 10. Social engineering attack using fake messages.
Down
- 1. Weakness that could be exploited.
- 2. Network of compromised devices under attacker control.
- 3. Attack where data is intercepted and possibly altered.
- 7. Code or method that takes advantage of a vulnerability.
- 8. Denial of Service aimed to crash a system or service.
