Across
- 1. Secures internet traffic over public networks
- 7. Converting data into an unreadable form
- 9. Fake system to lure attackers
- 11. Overwhelming a many systems with traffic
- 12. Records keystrokes secretly
- 13. Malware disguised as legitimate software
- 15. Secures data with one-way transformation
- 17. Malicious software
- 19. Digital proof of website authenticity
- 22. Pretending to be a trusted source
- 23. Self-replicating malware
Down
- 2. Tricking users to steal information
- 3. Guessing repeatedly to gain access
- 4. Hidden way to bypass security
- 5. Vulnerability with no known fix yet
- 6. Locks files for money
- 8. Network of infected devices
- 10. Exploits database query vulnerabilities
- 14. Isolated space to safely run untrusted code
- 16. Secretly monitors user activity
- 18. Security fix for a software
- 20. Protocol securing web communications
- 21. Filters network traffic
- 24. Adding extra login verification steps
