Across
- 2. authentication two-step identity verification
- 4. exploits unknown software vulnerability
- 8. verifies user identity
- 9. secretly monitors user activity
- 10. hides malicious activities
- 12. engineering manipulates people for information
- 13. fixes software vulnerabilities
- 16. force attack tries all password combinations
- 18. self-replicating malicious program
- 19. horse disguised malicious software
- 20. blocks unauthorized network access
Down
- 1. hidden access to systems
- 3. spreads copies across networks
- 5. converts data into code
- 6. encrypts data, demands ransom
- 7. testing simulates attacks to find vulnerabilities
- 11. fraudulent attempt to obtain information
- 14. network of infected devices
- 15. malicious software causing harm
- 17. overwhelms service with traffic
