Across
- 3. Secure connection tunnel
- 5. Monitoring software
- 8. Identity verification
- 14. Multi-factor authentication
- 16. Network of compromised devices
- 17. Network traffic filter
- 18. Unpatched vulnerability
Down
- 1. Security testing method
- 2. To encode data
- 4. Hidden system modification tool
- 6. Extortion malware
- 7. Isolated test environment
- 9. Science of encryption
- 10. Keyboard activity recorder
- 11. To trick someone into giving credentials
- 12. Overload attack
- 13. Hidden way into a system
- 15. Malicious software
