Across
- 2. for detecting and analyzing malicious activities within a network (3 letters)
- 5. A attack where a hacker tricks someone into revealing confidential information (6 letters)
- 10. Authentication factor using your fingerprint or face (7 letters)
- 11. Security incident where sensitive data is exposed to unauthorized parties (9 letters)
- 12. A hidden or disguised computer virus, 5 letters)
- 13. A type of network that connects devices wirelessly over short distances, 4 letters)
Down
- 1. Code injected by an attacker, usually for malicious purposes (5 letters)
- 3. Software that is installed without the user's knowledge and collects data, 7 letters)
- 4. The process of encoding data to keep it secure, 10 letters)
- 6. An unauthorized individual gaining access to systems, 6 letters)
- 7. A protection layer to prevent unauthorized access to a network (7 letters)
- 8. An encryption method that uses the same key to encrypt and decrypt data (3 letters)
- 9. A malicious software designed to disrupt or damage a system, 6 letters)