Across
- 2. Attack that overwhelms a system with massive fake traffic.
- 5. General term for malicious software.
- 6. Login method requiring two forms of authentication.
- 7. An update that fixes security vulnerabilities in software.
- 8. Network security system that blocks unauthorized access.
- 10. Software or hardware that records everything typed.
Down
- 1. A network of compromised computers controlled remotely
- 3. Unauthorized access to sensitive systems or data.
- 4. A vulnerability that hackers exploit before it’s patched.
- 7. A fake email scam designed to steal personal information.
- 9. Self-replicating program that spreads without human help.
- 11. Malware that locks files and demands payment.
