Security - Medium

12345678910
Across
  1. 3. routine of applying updates to software to address vulnerabilities
  2. 5. cryptographic attack involves trying all possible keys until the correct one is found
  3. 7. What do hackers do on a boat?
  4. 8. type of encryption which uses the same key for both encryption and decryption
  5. 9. a software vulnerability discovered by attackers before the vendor has become aware of it
  6. 10. the secret code that enhances the security of passwords
Down
  1. 1. type of attack involves intercepting and altering communication between two parties without their knowledge
  2. 2. technique that involves gaining unauthorized access by pretending to be someone else
  3. 4. a device or software that captures and records keystrokes on a computer
  4. 6. security measure to verify a user's identity through a unique biological or behavioral characteristic