Across
- 2. Investigates cybercrime evidence
- 4. Captures network traffic data
- 5. Physically isolated network security
- 6. Converts data into code
- 7. Overloads system with traffic
- 11. Malicious software or programs
- 13. Encrypts files, demands payment
- 15. Blocks unauthorized network access
- 19. Isolates untrusted code execution
- 20. – Repeated password guessing attack
Down
- 1. Fraudulent email for credentials
- 3. Steals active user session
- 8. web Hidden, encrypted online network
- 9. Targets vendor software security
- 10. Gains unauthorized higher access
- 12. Takes advantage of vulnerabilities
- 14. Disguised as legitimate software
- 16. Malicious code triggers conditionally
- 17. Network of infected computers
- 18. Unknown software vulnerability
