Across
- 6. Software that detects and removes malicious programs on a computer
- 9. Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
- 11. System designed to mimic a vulnerable resource to attract and monitor cyber attacks
- 12. Malware that encrypts user data, demanding payment for decryption
- 13. Secret or hidden access point in a system, often used to bypass normal authentication
- 14. Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
- 1. Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
- 2. Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
- 3. Weakness or flaw in a system that could be exploited for unauthorized access
- 4. A sequence of characters used for authentication to access a system or account
- 5. Hidden part of the internet associated with illicit activities and anonymity
- 7. Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
- 8. Security system that monitors and controls network traffic
- 9. Team Defensive cybersecurity team responsible for protecting a system or network.
- 10. Network of compromised computers controlled by a single entity for malicious activities