Across
- 3. Type of hacker who uses skills for good (9 letters)
- 8. A tool used to block unauthorized network access (8 letters)
- 9. Mathematical process to hide data (10 letters)
Down
- 1. Masquerading as a trustworthy entity to obtain information (8 letters)
- 2. Testing systems to find vulnerabilities (13 letters)
- 4. Program exploiting vulnerabilities for malicious purposes (7 letters)
- 5. A weakness in a system (12 letters)
- 6. Software that damages or disrupts systems (7 letters)
- 7. Verification of user identity (14 letters)
