Cybersecurity

1234567891011121314151617181920212223242526272829
Across
  1. 2. Code used to take advantage of a vulnerability
  2. 4. Isolated environment used to test software safely
  3. 5. Hidden method to bypass normal authentication
  4. 6. Malware that hides its presence and grants admin access
  5. 10. Device that filters network traffic to enhance security
  6. 12. Malicious software designed to harm or compromise systems
  7. 13. Network of infected devices controlled remotely
  8. 18. Deceptive technique to steal confidential information
  9. 19. Manipulation technique to trick people into giving information
  10. 20. Detection of unauthorized access or suspicious activity
  11. 21. Unauthorized access to confidential data
  12. 23. Process of verifying the identity of a user or device
  13. 24. Attack that floods a network or server to disrupt service
  14. 25. Deliberate attempt to damage or access a computer system
  15. 27. Program that records every keystroke typed
  16. 28. Impersonation technique to deceive systems or users
  17. 29. Security method that requires two forms of identification
Down
  1. 1. Rule-based barrier that blocks or allows network traffic
  2. 3. Process of converting data into an unreadable format for protection
  3. 7. Digital file used to prove the identity of a website or user
  4. 8. Update to fix security vulnerabilities in software
  5. 9. Malware that encrypts files and demands payment for access
  6. 11. Software that detects and removes malicious programs
  7. 14. Virtual private network that encrypts internet connections
  8. 15. Weakness in a system that can be exploited by attackers
  9. 16. Function that converts data into a fixed-size string
  10. 17. Vulnerability unknown to developers and without a fix
  11. 22. Decoy system used to lure and monitor attackers
  12. 26. Malware disguised as legitimate software
  13. 28. Software that secretly collects user information