Across
- 2. Online harassment or bullying
- 5. Impersonating someone or something to deceive
- 6. Software update to fix security vulnerabilities
- 9. Measures taken to protect data
- 10. Function that converts data into a fixed size
- 13. Network of compromised computers under attacker control)
- 15. Securing data by converting it into code
- 17. Distributed Denial of Service attack to overwhelm a network)
- 19. Investment scam involving fake accounts
- 20. Self-replicating malware that spreads across networks)
- 22. Software that shows unwanted ads
- 23. A system that protects networks
Down
- 1. Fraudulent attempts to steal sensitive information)
- 3. Malware that encrypts files demanding ransom
- 4. Zero Trust Architecture
- 7. Hidden way of bypassing security controls
- 8. Malware disguised as legitimate software
- 11. Attack using trial and error to guess passwords)
- 12. Software that records keystrokes
- 14. Virtual Private Network for secure connections
- 16. Vulnerabilities exploited before being patched
- 18. Software that collects data secretly
- 21. Multi-Factor Authentication
