Across
- 2. Character string, often protected by hashing, required for system entry
- 8. Malicious actor breaching security for personal gain or disruption
- 10. Simulating covert and authorized intrusions to assess system fortitude
- 13. Multi-layered process confirming user legitimacy within a secure environment
- 15. Systematic flaw that adversaries actively seek to compromise
Down
- 1. Distributed technique that overwhelms network resources, halting normal activity
- 3. Psychological manipulation of individuals to divulge confidential details
- 4. Deceptive social engineering tactic exploiting user trust to harvest credentials
- 5. Hidden digital threat capable of data exfiltration or destruction upon execution
- 6. Tool for scanning networks and discovering open ports
- 7. Professional hacker conducting authorized assessments to bolster cyber defenses
- 9. powerful framework used for developing,testing and exploits
- 11. Malicious software masquerading as useful program to infiltrate the system
- 12. Acts as a barricade, filtering suspicious packets from entering trusted zones
- 14. Uses complex algorithms to render sensitive data unreadable to unauthorized eyes
