Cyberattacks
Across
- 6. users attack
- 7. standalone malware
- 8. cyber-impersonation
- 9. malware that encrypts file in exchange for ransom
- 11. who acquires Bitcoin by solving math
- 12. cyber-attack (first word only)
Down
- 1. logging of pressed keys
- 2. and intercepts
- 3. software without user’s consent
- 4. all combinations of possible password
- 5. over IP attacks
- 10. when infects a host computer