Across
- 3. An technical expert with malicious intent.
- 6. A weakness or flaw of the system, that an attacker would be leveraging
- 10. Technique of scrambling data, so that only authorized ones can understand the information
- 11. An advanced malware, that encrypts data and blackmails you
- 12. Your secret string that no one should know
- 14. A string of words used for authentication, it's not a password..!
- 15. Interconnected systems for sharing information
- 16. A form of fraud using phone calls
Down
- 1. It's not an insect, but crawls and replicates within a network
- 2. A form of social engineering attack.
- 4. A sophisticated malware specialized to hide in plain sight.
- 5. It’s a security wall for your network
- 7. A widespread technology, not related to your tooth
- 8. It protects from viruses, but if not updated its useless
- 9. A piece of software tends to harm you.
- 13. Message based fraud technique, very common these days
