Across
- 7. Extracting detailed information from a target
- 8. Malicious code that replicates itself
- 9. Person who finds and exploits system vulnerabilities
- 10. Security barrier between network and internet
- 13. Gathering information about a target system
- 15. Manipulating people to reveal confidential info
Down
- 1. Code or method used to take advantage of a vulnerability
- 2. Software designed to harm or exploit systems
- 3. Weakness that can be exploited
- 4. Fake emails used to steal information
- 5. Process of converting data into unreadable code
- 6. Software that secretly monitors user activity
- 11. Identifying active hosts and open ports
- 12. Attack that makes a system unavailable
- 14. Self-replicating malware spreading through networks
