Across
- 3. routine of applying updates to software to address vulnerabilities
- 5. cryptographic attack involves trying all possible keys until the correct one is found
- 7. What do hackers do on a boat?
- 8. type of encryption which uses the same key for both encryption and decryption
- 9. a software vulnerability discovered by attackers before the vendor has become aware of it
- 10. the secret code that enhances the security of passwords
Down
- 1. type of attack involves intercepting and altering communication between two parties without their knowledge
- 2. technique that involves gaining unauthorized access by pretending to be someone else
- 4. a device or software that captures and records keystrokes on a computer
- 6. security measure to verify a user's identity through a unique biological or behavioral characteristic
