CrossWord

123456789101112131415161718
Across
  1. 2. The art of disguising messages (11 letters)
  2. 3. Testing a system’s defenses by simulating attacks (11 letters)
  3. 6. A weakness that could allow an attacker to exploit a system (12 letters)
  4. 8. Authentication method requiring two forms of verification (9 letters)
  5. 11. Attack where attacker pretends to be a trusted entity (7 letters)
  6. 12. Unauthorized entry into a system or network (7 letters)
  7. 13. Unintentional or intentional access to sensitive data (7 letters)
  8. 14. Malicious program that spreads across computers (5 letters)
  9. 15. Software used to monitor and control network traffic (9 letters)
  10. 17. Process of verifying identity (13 letters)
Down
  1. 1. Hidden software used to maintain access on a system (8 letters)
  2. 4. Converts plain text into an unreadable format (9 letters)
  3. 5. A program designed to replicate itself and spread (5 letters)
  4. 7. Type of cyber-attack where access is blocked until ransom is paid (9 letters)
  5. 9. Technique to gain sensitive information through social interaction (10 letters)
  6. 10. of attack where users are overwhelmed with traffic (7 letters)
  7. 11. Protects against unauthorized access to data
  8. 16. Unauthorized access or control over a system (4 letters)
  9. 18. A harmful software disguised as legitimate