Across
- 2. A type of cybercrime where someone's personal information is stolen and misused
- 3. An attack that exploits memory allocation errors to overwrite system data
- 4. Cracking A technique that tries every possible password combination until the correct one is found
- 7. A type of malware that can replicate itself and spread without user intervention
- 8. A technique used to hide information within an image, audio, or video file
Down
- 1. A malicious program that records keystrokes to steal passwords and other sensitive data
- 4. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity
- 5. Injection A code injection attack that targets databases through user input fields
- 6. An attack that overwhelms a system with excessive requests to make it unavailable
