Across
- 6. A deliberate attempt by hackers or malicious entities to infiltrate systems, networks, or devices to steal, alter, or destroy data, disrupt operations, or cause damage.
- 8. A weakness in a system that could be exploited.
- 9. Breaches Confidential, sensitive, or protected information is accessed, disclosed, or stolen by unauthorized individuals.
Down
- 1. A piece of software or technique used to take advantage of a vulnerability.
- 2. A measure of the extent to which an entity is threatened by a potential circumstance or event.
- 3. Theft Someone illegally obtains and uses another person’s personal information to impersonate them for financial gain or fraud.
- 4. The part of malware that performs malicious actions once a system is compromised.
- 5. Previously unknown vulnerabilities that can be exploited before a patch is available.
- 7. A potential danger to a system or organization.
- 9. Measures taken to protect against attacks and mitigate risks.
- 10. An attempt to exploit a vulnerability to compromise a system.