Cybersecurity

123456
Across
  1. 2. device or node that connects to a network, such as a computer, smartphone, or IoT device, often targeted in cybersecurity attacks.
  2. 3. secret or undocumented way of gaining access to a system or network, typically used for malicious purposes or as a debugging feature.
  3. 5. the act of making something known or the fact that is made known
  4. 6. (Movement)cybersecurity term referring to the act of moving through a network from one system to another after gaining initial access.
Down
  1. 1. modify or adapt something (e.g., a device or software) for a different, often unintended, use—frequently associated with malicious intent in cybersecurity contexts.
  2. 3. to avoid something by going around it
  3. 4. type of attack that makes a system, service, or network unavailable by overwhelming it with a flood of requests or traffic.