Cryptober Crossword Puzzle #1

12345678910111213141516
Across
  1. 9. The means of proving identity using two authentication factors
  2. 10. Any weakness in an asset or security protection which would allow for a threat to cause harm
  3. 12. The act of falsifying the identity of the source of a communication or interaction
  4. 14. A means of security evaluation where automated tools and manual exploitations are performed by security and attack experts
  5. 15. Program designed to detect and remove computer viruses
  6. 16. A social engineering attack that attempts to collect information from victims
Down
  1. 1. In computing, the process or action of verifying the identity of a user or process
  2. 2. A means of isolating applications from critical system resources and other programs. It provides an extra layer of security that prevents malware or harmful applications from negatively affecting your system.
  3. 3. The number one spot in the OWASP 10
  4. 4. Any code written for the specific purpose of causing harm, disclosing information or otherwise violating the security or stability of a system
  5. 5. A security tool that attempts to detect the presence of intruders or the occurrence of security violations
  6. 6. Small amounts of data generated by websites that are saved by a browser
  7. 7. The act of collecting frames or packets off of a data network communication
  8. 8. A set of changes to a computer program or its supporting data designed to update, fix, or improve it. ... This includes fixing security vulnerabilities and other bugs.
  9. 11. An error or mistake in software coding or hardware design or construction
  10. 13. A type of surveillance software used to record the keystrokes made on a device