Across
- 2. A type of malware that replicates itself by infecting other programs or files.
- 4. A method used to circumvent security measures.
- 5. An attempt to gain unauthorized access or cause harm to a system.
- 7. Weaknesses in a system that can be exploited by attackers.
- 8. A technique where attackers use fraudulent emails to steal sensitive information.
Down
- 1. Malicious software designed to disrupt, damage, or gain unauthorized access to a system.
- 3. The act of disguising communication to appear as if it comes from a trusted source.
- 6. An incident where data is accessed without authorization.