Across
- 2. Harmful software like viruses or worms.
- 5. Tricking users into revealing sensitive info.
- 8. Verifying a user's identity.
- 10. Hidden access to a system.
- 11. Blocks unauthorized network access.
- 14. Manipulating people to leak info.
- 15. Converts data into an irreversible code.
Down
- 1. Adds a second verification step.
- 3. Converts data into a secure code.
- 4. Secretly collects user data.
- 6. Hacked computers used for attacks.
- 7. Malware disguised as a normal file.
- 9. Locks files and demands payment.
- 12. Hides IP and encrypts internet traffic.
- 13. Attack Guessing passwords repeatedly.
