Across
- 3. Base-10 number system
- 5. Subset of the internet with addresses sharing a common suffix
- 7. Base-16 number system
- 8. Performs tasks on command, allowing attackers to remotely control an affected computer
- 9. Part of a computer system or network which is designed to block unauthorized access while permitting outward communication
- 10. Malware that can replicate itself to spread to other connected computers
- 12. Input value to a command
- 15. Malware that functions by spying on user activity without their knowledge
- 17. Process of encoding data to prevent theft
- 19. Block of data transmitted across a network
- 21. Type of cyber attack where attacker attempts to trick the victim into giving them information
- 22. Type of malware that corrupts and spreads between victims
- 23. System for connecting a number of computer systems to form a local area network
- 24. The second phase of ethical hacking
- 25. Type of cyber attack where data is kept from the victim until a price is paid to the hacker
Down
- 1. The third phase of ethical hacking
- 2. Software that can harm a system
- 4. Operation of joining character strings end-to-end
- 6. Base-2 number system
- 11. The first phase of ethical hacking
- 13. The fourth phase of ethical hacking
- 14. Software that takes advantage of a flaw in a computer system
- 16. Attack where hacker injects false training data to corrupt the learning model
- 18. Hidden details of a system or a process, allowing the user to focus on the details that are important for the task at hand
- 20. The creation of a child process from a parent process
