Across
- 3. Act of furtively listening to a private conversation
- 5. A weakness which allows an attacker to reduce a system's information assurance
- 9. Software that is given to the user with advertisements embedded in the application
- 10. Situation in which one person or program successfully masquerades as another
- 11. Malicious software
Down
- 1. Software that aids in gathering information about a person or organisation without their knowledge
- 2. Attack designed to make an operating system unusable
- 4. The condition of being protected against danger or loss
- 6. Computer software used to prevent, detect and remove malicious software
- 7. A destructive program that masquarades as a benign application
- 8. Method of bypassing normal authentication
