Across
- 2. A general term for malicious software.
- 6. An incident where data is accessed without authorization.
- 7. A hidden method of bypassing normal authentication.
- 9. Software that secretly gathers user information without consent.
- 11. Impersonating another device or user to gain access.
- 12. A self-replicating malware that spreads without user interaction.
- 14. The process of verifying a user's identity.
Down
- 1. The part of malware that performs the malicious action.
- 3. A type of malware disguised as legitimate software.
- 4. A potential cause of an unwanted incident in cybersecurity.
- 5. Fraudulent attempt to obtain sensitive information via email or messaging.
- 7. A network of infected devices controlled remotely.
- 8. A stealthy type of malware designed to hide its presence.
- 10. A piece of code that takes advantage of a vulnerability.
- 13. Malware that attaches to files and spreads when executed.
- 15. A method of converting data into a fixed-size string, often used for passwords.
