Test

12345678910111213
Across
  1. 2. - Software designed to damage or disrupt systems.
  2. 5. - A cyber attack that overwhelms a server.
  3. 8. - Simulating an attack to identify vulnerabilities.
  4. 10. - A software update to fix vulnerabilities.
  5. 11. - Fraudulent attempts to obtain sensitive information via email.
  6. 12. - A group of infected computers under a hacker’s control.
Down
  1. 1. - A hacker engaged in activism.
  2. 3. - Software that detects and removes malware.
  3. 4. Engineering - Manipulating people to gain confidential info.
  4. 6. Breach - Unauthorized access to confidential data.
  5. 7. - Software that secretly gathers information about a person.
  6. 9. - Unsolicited messages or emails.
  7. 13. - Malicious software disguised as legitimate software.