Master

12345678910
Across
  1. 2. A network of infected computers controlled by a hacker.
  2. 4. A string of text created from data for verification.
  3. 5. An attack that floods a server with traffic to crash it.
  4. 6. A deliberate effort to compromise a computer system.
  5. 8. A security model where no one inside a network is trusted by default.
  6. 9. A simulation of an attack to test security.
Down
  1. 1. Investigating digital data to find evidence.
  2. 3. A pathway used by attackers to exploit a vulnerability.
  3. 7. Tools used to create fake emails for attacks.
  4. 10. A deviation from normal behavior in system logs.