Across
- 4. A secret word or phrase used to authenticate access
- 7. Verifying the identity of a user or device
- 9. The malicious part of malware delivered after exploitation
- 10. Malicious act of publicly releasing personal information online
- 12. Secures information using mathematical algorithms
- 14. Any software intentionally designed to cause damage or unauthorized access
- 15. Deceptive attempt to steal sensitive information
- 16. A network of compromised devices controlled by an attacker
Down
- 1. One-way transformation of data into a fixed-length string
- 2. Network device or software that filters traffic
- 3. Malicious program that can replicate and spread
- 5. A potential danger to cybersecurity
- 6. The practice of disguising communication to appear as a trusted entity
- 8. Takes advantage of a software vulnerability
- 11. An incident where data is accessed or disclosed without authorization
- 13. Secret method to bypass security controls
