Across
- 2. – Distributed attack that overwhelms a system with traffic (4)
- 5. force – Attack method involving trial and error (10)
- 7. – Fraudulent attempt to obtain sensitive information (8)
- 9. – A system designed to block unauthorized access (8)
- 11. – Network of infected computers controlled remotely (6)
- 13. – Testing method to evaluate security defenses (11)
- 14. – Advanced Encryption Standard used for securing data (3)
- 16. – Software designed to disrupt or damage systems (7)
Down
- 1. – A vulnerability that is exploited before being fixed (8)
- 3. – Software that secretly monitors user activity (7)
- 4. – Digital document proving ownership of a public key (11)
- 6. – Process of converting data into a code (10)
- 8. – A weakness in a system that can be exploited (13)
- 10. – Malware that demands payment to restore access (10)
- 12. – A type of malware disguised as legitimate software (6)
- 15. – Process of converting data into a fixed-size value (7)
