Across
- 4. horse Malicious software disguised innocuously.
- 6. Identity verification using traits.
- 11. Malicious software threat
- 14. Malicious code component.
- 15. security Device-specific protection measures.
- 17. policy Guidelines for security measures.
- 19. Applying software updates regularly.
- 20. Weakness in system security.
Down
- 1. Deceptive email communication.
- 2. testing Ethical hacking simulation.
- 3. Malware with system-level access.
- 5. hygiene Good digital security practices.
- 7. incident Breach or violation event.
- 8. Identity verification using traits.
- 9. Malicious digital intrusion attempt.
- 10. Network security barrier.
- 12. Data protection through scrambling.
- 13. Secure communication technique.
- 16. Software against malicious programs.
- 18. hat Ethical security expert.