Across
- 2. A network of infected computers controlled by a hacker.
- 4. A string of text created from data for verification.
- 5. An attack that floods a server with traffic to crash it.
- 6. A deliberate effort to compromise a computer system.
- 8. A security model where no one inside a network is trusted by default.
- 9. A simulation of an attack to test security.
Down
- 1. Investigating digital data to find evidence.
- 3. A pathway used by attackers to exploit a vulnerability.
- 7. Tools used to create fake emails for attacks.
- 10. A deviation from normal behavior in system logs.
