Cyber Security

12345678910111213141516
Across
  1. 2. – Distributed attack that overwhelms a system with traffic (4)
  2. 5. force – Attack method involving trial and error (10)
  3. 7. – Fraudulent attempt to obtain sensitive information (8)
  4. 9. – A system designed to block unauthorized access (8)
  5. 11. – Network of infected computers controlled remotely (6)
  6. 13. – Testing method to evaluate security defenses (11)
  7. 14. – Advanced Encryption Standard used for securing data (3)
  8. 16. – Software designed to disrupt or damage systems (7)
Down
  1. 1. – A vulnerability that is exploited before being fixed (8)
  2. 3. – Software that secretly monitors user activity (7)
  3. 4. – Digital document proving ownership of a public key (11)
  4. 6. – Process of converting data into a code (10)
  5. 8. – A weakness in a system that can be exploited (13)
  6. 10. – Malware that demands payment to restore access (10)
  7. 12. – A type of malware disguised as legitimate software (6)
  8. 15. – Process of converting data into a fixed-size value (7)