CyberHeist

12345678910111213141516171819
Across
  1. 5. A type of software designed to protect against malware and other cyber threats.
  2. 7. A type of cyber attack that involves taking control of a computer or network and demanding payment for release.
  3. 8. A type of attack that bombards a network with traffic to bring it down.
  4. 9. A security system designed to prevent unauthorised access to a network.
  5. 12. A type of malware that encrypts files and demands payment to decrypt them.
  6. 13. A type of cyber attack that uses stolen login credentials to access a network.
  7. 14. Software designed to harm a computer or network.
  8. 15. A type of cyber attack that targets physical infrastructure, such as power plants or transportation systems.
  9. 16. A type of cyber attack that involves stealing sensitive information through a fake website or email.
  10. 17. A type of cyber attack that targets vulnerabilities in software.
  11. 19. The practice of accessing a computer network illegally.
Down
  1. 1. A type of cyber attack that involves manipulating a user into taking an action that harms the network's security.
  2. 2. A type of cyber attack that involves stealing sensitive information through an infected USB drive.
  3. 3. A type of malware that copies itself and spreads throughout a network.
  4. 4. A security process that requires two forms of authentication to access a network.
  5. 6. A type of malware that can spy on a computer user's activities.
  6. 7. A type of cyber attack that involves blocking access to a network until a ransom is paid.
  7. 10. A form of phishing that targets high-profile individuals.
  8. 11. A type of cyber attack that involves flooding a network with requests to disrupt its operation.
  9. 18. A type of social engineering attack that impersonates a trusted entity to steal information. type of cyber attack that targets vulnerabilities in software.