Across
- 1. A weakness in a system that can be exploited by hackers
- 3. A network of infected computers secretly controlled by a central attacker
- 6. Physical characteristics like fingerprints or facial recognition used for identification
- 8. A recently discovered software flaw that the vendor has not yet fixed
- 9. The science of secure communication and writing in secret codes
- 10. Malicious software designed to hide the existence of certain processes or programs
- 12. Falsifying data to disguise malicious communication as coming from a trusted source
- 13. A physical device like a laptop or phone that connects to a corporate network
- 15. Software that secretly records every letter typed on a keyboard
Down
- 2. The process of verifying the identity of a user or system
- 4. The process of converting unreadable scrambled data back into plain text
- 5. A cyber attack that redirects a user's website traffic to a fake site
- 7. A hidden method used to bypass normal security and access a system
- 11. Malware that demands payment to restore access to your data
- 14. An attack that completely overwhelms a system with a massive flood of internet traffic
