Crossword Puzzle Challenge

123456789101112131415
Across
  1. 2. A general term for malicious software.
  2. 6. An incident where data is accessed without authorization.
  3. 7. A hidden method of bypassing normal authentication.
  4. 9. Software that secretly gathers user information without consent.
  5. 11. Impersonating another device or user to gain access.
  6. 12. A self-replicating malware that spreads without user interaction.
  7. 14. The process of verifying a user's identity.
Down
  1. 1. The part of malware that performs the malicious action.
  2. 3. A type of malware disguised as legitimate software.
  3. 4. A potential cause of an unwanted incident in cybersecurity.
  4. 5. Fraudulent attempt to obtain sensitive information via email or messaging.
  5. 7. A network of infected devices controlled remotely.
  6. 8. A stealthy type of malware designed to hide its presence.
  7. 10. A piece of code that takes advantage of a vulnerability.
  8. 13. Malware that attaches to files and spreads when executed.
  9. 15. A method of converting data into a fixed-size string, often used for passwords.