Across
- 2. - Software designed to damage or disrupt systems.
- 5. - A cyber attack that overwhelms a server.
- 8. - Simulating an attack to identify vulnerabilities.
- 10. - A software update to fix vulnerabilities.
- 11. - Fraudulent attempts to obtain sensitive information via email.
- 12. - A group of infected computers under a hacker’s control.
Down
- 1. - A hacker engaged in activism.
- 3. - Software that detects and removes malware.
- 4. Engineering - Manipulating people to gain confidential info.
- 6. Breach - Unauthorized access to confidential data.
- 7. - Software that secretly gathers information about a person.
- 9. - Unsolicited messages or emails.
- 13. - Malicious software disguised as legitimate software.
