CompTIA Network+ (009) Ch. 9

12345678910
Across
  1. 4. Confidentiality, Integrity, and Availability security triad.
  2. 5. Malicious software that can harm systems.
  3. 6. Potential cause of an unwanted incident.
  4. 9. Pretending to be another device or user.
  5. 10. Social engineering attack using fake messages.
Down
  1. 1. Weakness that could be exploited.
  2. 2. Network of compromised devices under attacker control.
  3. 3. Attack where data is intercepted and possibly altered.
  4. 7. Code or method that takes advantage of a vulnerability.
  5. 8. Denial of Service aimed to crash a system or service.