Across
- 1. Malware that locks data until a ransom is paid
- 4. Detecting and fixing errors in software
- 11. Process of substituting sensitive data with non sensitive placeholder
- 12. Process of converting data into coded form for security
- 13. Converts high level code into machine readable format
- 15. Transforming data into fixed length value for quick lookup
Down
- 2. Step by step instructions for solving a computational problem
- 3. Attack that exploits database query vulnerabilities
- 5. Network of compromised computers used in attacks
- 6. AI model inspired by human brain structure
- 7. Intermediary server between a client and destination
- 8. FIFO based data structure
- 9. Network security system controlling incoming outgoing traffic
- 10. LIFO based data structure
- 14. Social engineering attack to steal sensitive information
