Across
- 2. An attack that exploits software flaws before developers can release a patch or fix.
- 4. The process of confirming the identity of a user, typically before granting access to resources.
- 7. An unauthorized action that exposes, steals, or compromises data from a system.
- 9. The process of testing a system, network, or web application to find security vulnerabilities.
- 11. A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
- 12. A security mechanism that prevents unauthorized access to a network by filtering traffic.
- 13. A type of malicious software designed to gain unauthorized access to a computer system.
Down
- 1. A program that secretly records everything typed on a computer, usually for malicious purposes.
- 3. A cyberattack where the perpetrator floods a server with excessive traffic
- 5. A malicious attack where data is encrypted by criminals to demand payment for its release.
- 6. Which term is used to describe the “cargo” that malware brings with it when it infects a device?
- 8. What is a term for a group of computers that is networked together and used by hackers to steal information?
- 10. A malicious program disguised as legitimate software, often used to gain unauthorized access.
