Across
- 2. ethical hacking that tests a system's defenses
- 5. OS that controls machines that run specific tasks
- 8. devices that aren't computers that connect to the internet
- 9. exploits by attackers before others know about the vulnerability
- 10. software that controls specific hardware devices connected to a system
- 12. command that ends a task immediately
- 13. the OS type that covers desktops and laptops
- 14. mistakes in code that can create security loopholes
- 15. Apple's mobile device OS
Down
- 1. older sections of code that haven't been updated or reviewed
- 3. virtual machine that runs on a different machine
- 4. Google's mobile device OS
- 6. external software or plugins integrated with the OS
- 7. Microsoft's OS
- 11. unauthorized access to confidential data
