Across
- 2. The art of disguising messages (11 letters)
- 3. Testing a system’s defenses by simulating attacks (11 letters)
- 6. A weakness that could allow an attacker to exploit a system (12 letters)
- 8. Authentication method requiring two forms of verification (9 letters)
- 11. Attack where attacker pretends to be a trusted entity (7 letters)
- 12. Unauthorized entry into a system or network (7 letters)
- 13. Unintentional or intentional access to sensitive data (7 letters)
- 14. Malicious program that spreads across computers (5 letters)
- 15. Software used to monitor and control network traffic (9 letters)
- 17. Process of verifying identity (13 letters)
Down
- 1. Hidden software used to maintain access on a system (8 letters)
- 4. Converts plain text into an unreadable format (9 letters)
- 5. A program designed to replicate itself and spread (5 letters)
- 7. Type of cyber-attack where access is blocked until ransom is paid (9 letters)
- 9. Technique to gain sensitive information through social interaction (10 letters)
- 10. of attack where users are overwhelmed with traffic (7 letters)
- 11. Protects against unauthorized access to data
- 16. Unauthorized access or control over a system (4 letters)
- 18. A harmful software disguised as legitimate
