Across
- 3. bug that exploited a weakness in OpenSSL
- 4. accessing systems that you are not authorized to access
- 7. use of voice print of fingerprint
- 8. a route that skips regular security in software
- 9. malicious software that can change and wreak havoc on your system
- 13. malware that locks users out of the system via encryption
- 14. email scams
- 16. the James Bond of malware
- 17. malicious software that disguises itself
- 18. devices that use rfid to capture data
- 19. fake website scam
Down
- 1. is not a joke Jim
- 2. worm that attacked Iran's nuclear centrifuges
- 3. hacking for a cause
- 5. acronym, attack that slows down a server with requests
- 6. beginnings of the internet
- 10. country that was targeted by Russia and attacked its power grid
- 11. an amalgamation of malicious devices that creates zombies
- 12. scrambling code to make it unreadable for security
- 15. one of its kind was named Conficker
