Across
- 1. Software designed to harm or exploit computer systems
- 6. A deliberate attempt to exploit computer systems or networks.
- 7. A reward offered for discovering and reporting software bugs
- 8. A secret word or phrase used for authentication.
- 9. A series of instructions for a computer to execute.
- 10. Protective measures against digital threats
Down
- 2. Ethical hackers working to improve security
- 3. The right to keep personal information and activities confidential.
- 4. A weakness or flaw in a system that can be exploited.
- 5. The process of converting information into a code for security.