Across
- 5. Umbrella term for malicious software.
- 8. Code or technique used to take advantage of a vulnerability.
- 10. Fraudulent attempt to obtain sensitive information through deception.
- 11. Malicious program that records keystrokes.
- 12. Unknown vulnerability with no available patch.
- 13. Security technique that executes programs in an isolated environment.
- 14. Process of verifying a user's identity.
- 15. One-way process used to securely store passwords.
- 16. A weakness that can be exploited by an attacker.
- 17. Harmful component delivered by malware.
Down
- 1. Security device that filters network traffic based on rules.
- 2. Technique used to protect data by converting it into unreadable form.
- 3. Malware designed to hide itself and maintain privileged access.
- 4. Malware that encrypts files and demands payment.
- 6. Group of compromised systems controlled remotely.
- 7. Defines what an authenticated user is allowed to do.
- 9. Unauthorized attempt to access a system.
