Across
- 1. — Program that records keystrokes to steal information.
- 4. — Network security system that blocks unauthorized access.
- 8. — Secret way to bypass normal authentication in a system.
- 10. — Set of rules governing data communication on networks.
- 11. — Process of converting encrypted data back to readable form.
- 14. — Process of verifying a user's identity.
- 15. — Malicious program disguised as legitimate software.
- 17. — Software that secretly monitors user activity.
- 18. — Network of infected computers controlled by a hacker.
- 19. — Unauthorized access to a computer system.
Down
- 2. — Process of converting data into a secure coded form.
- 3. — Newly discovered vulnerability with no patch yet.
- 5. — Code that takes advantage of a system vulnerability.
- 6. — Software designed to damage or disrupt computers.
- 7. — Malware designed to gain hidden administrator access.
- 9. — Isolated environment used to test suspicious files.
- 10. — Scam emails or messages that try to steal passwords or personal data.
- 12. — Malware that locks files and demands payment.
- 13. — Fixed-length value used to verify data integrity.
- 16. — Pretending to be a trusted source in communication.
