Across
- 10. Flooding a service so it can’t respond normally.
- 11. A fix released to close a security hole.
- 12. Login info (like usernames, passwords, tokens).
- 13. A second step to confirm a login (code/app prompt).
- 14. Many infected devices controlled together by an attacker.
Down
- 1. A weakness in software/system that can be exploited.
- 2. Scrambling data so only the right key can read it.
- 3. Threat coming from someone within the organisation.
- 4. Installing the latest version to improve/secure software.
- 5. Malware that locks files until money is demanded.
- 6. Trick messages designed to steal info or make you click.
- 7. When data is accessed/stolen without permission.
- 8. A secret used to access an account.
- 9. Multiple methods to prove identity (similar to 2FA).
