CITS2006-C10-Mohammad

123456789101112131415161718192021222324
Across
  1. 1. Secures internet traffic over public networks
  2. 7. Converting data into an unreadable form
  3. 9. Fake system to lure attackers
  4. 11. Overwhelming a many systems with traffic
  5. 12. Records keystrokes secretly
  6. 13. Malware disguised as legitimate software
  7. 15. Secures data with one-way transformation
  8. 17. Malicious software
  9. 19. Digital proof of website authenticity
  10. 22. Pretending to be a trusted source
  11. 23. Self-replicating malware
Down
  1. 2. Tricking users to steal information
  2. 3. Guessing repeatedly to gain access
  3. 4. Hidden way to bypass security
  4. 5. Vulnerability with no known fix yet
  5. 6. Locks files for money
  6. 8. Network of infected devices
  7. 10. Exploits database query vulnerabilities
  8. 14. Isolated space to safely run untrusted code
  9. 16. Secretly monitors user activity
  10. 18. Security fix for a software
  11. 20. Protocol securing web communications
  12. 21. Filters network traffic
  13. 24. Adding extra login verification steps