Across
- 3. A method used for guessing password using a high volume of combinaisons
- 7. A way for cybercriminals to trick someone for redirecting them in a not authorized jacket
- 8. A system designed to prevent unauthorized access to or from a computer network
- 9. A way for cybercriminals to hide stolen data or malicious code in images, audio files and others malicious code in images, audio files and other media
Down
- 1. A weakness in a computer system or network that can possibly be exploited by attackers to compromise the security.
- 2. A malfunction or weakness in the software
- 4. Completly Automated Public Turing Test To Tell Computers and Humans Apart
- 5. An exploitation system for computer
- 6. A type of attack where the pirate takes the victim’s files has an hostages and ask for money to give them back
- 10. A way to verify someone identity