Security

1234567891011
Across
  1. 3. Act of furtively listening to a private conversation
  2. 5. A weakness which allows an attacker to reduce a system's information assurance
  3. 9. Software that is given to the user with advertisements embedded in the application
  4. 10. Situation in which one person or program successfully masquerades as another
  5. 11. Malicious software
Down
  1. 1. Software that aids in gathering information about a person or organisation without their knowledge
  2. 2. Attack designed to make an operating system unusable
  3. 4. The condition of being protected against danger or loss
  4. 6. Computer software used to prevent, detect and remove malicious software
  5. 7. A destructive program that masquarades as a benign application
  6. 8. Method of bypassing normal authentication