Across
- 3. A type of malware that locks files and demands payment for access
- 4. A network security system that monitors and controls incoming and outgoing traffic
- 9. A manipulation technique used to deceive users into giving up confidential data
- 10. The process of converting data into a coded format for security
- 11. An update designed to fix security vulnerabilities in software
- 12. An attack that tricks users into revealing sensitive information
- 14. A hidden entry point in software that allows unauthorized access
- 15. A cyber attack that overwhelms a network or service with traffic
- 17. A tool used to create a secure, encrypted connection over the internet
- 18. Malicious software that secretly gathers user information
Down
- 1. An attack that tries multiple password combinations until the correct one is found
- 2. Malicious software that can damage files or steal information
- 5. A method of securing passwords by transforming them into fixed-length values
- 6. A security vulnerability that is exploited before a fix is available
- 7. Software embedded in hardware that controls device functionality
- 8. A security practice of verifying user identity
- 11. A secret key used for encrypting and decrypting messages
- 13. A type of malware disguised as legitimate software
- 14. A network of compromised computers controlled by an attacker
- 16. A type of software that records keystrokes to steal passwords
