Across
- 2. Malware hidden inside legitimate software
- 5. Testing a system for weaknesses
- 7. Type of injection attack targeting databases
- 9. Spreads across a network by itself
- 10. Trial-and-error password attack
- 14. Monitoring unsecure WiFi traffic
- 15. Attack that floods a server with traffic
- 16. Monitors and filters network traffic
- 17. Fake email scam to steal information
- 18. Secret string used to log in
Down
- 1. A network of devices used for DOS attack
- 3. Scrambles data to keep it secure
- 4. Generic term for harmful software
- 6. Software that detects and removes malware
- 7. Secretly collects user data
- 8. Verifying a user’s identity
- 11. Code used to substitute characters
- 12. Encrypts files and demands payment
- 13. Malware that needs a host file to spread
