Across
- 1. Network of hijacked computers
- 2. Manipulating people for access
- 3. Physically isolates a system
- 7. Vulnerability with no fix yet
- 8. Isolates programs for security
- 9. Adds extra login security
- 11. Impersonates a trusted source
- 12. Blocks unauthorized network access
- 14. Fixes security vulnerabilities
- 16. Self-replicates across networks
- 19. Steals active user session
- 20. Takes advantage of a weakness
- 22. Disguised malware for attacks
- 24. Malicious software harming devices
- 26. Tricks users into clicking links
Down
- 1. Hidden entry for unauthorized access
- 2. Secretly monitors user activity
- 4. Secures internet connection
- 5. Tries all password combinations
- 6. Converts data into fixed string
- 10. Unwanted or junk emails
- 11. Attacks databases with queries
- 13. Records keystrokes for theft
- 15. Displays unwanted advertisements
- 17. Encrypts files for payment
- 18. Overwhelms a server with traffic
- 20. Secures data using codes
- 21. Fraudulent attempt to steal data
- 23. Hidden part of the internet
- 25. Hides malware in a system
