CyberDSA D1
Across
- 1. Malicious software designed to damage systems
- 3. Malicious program disguised as legitimate software
- 5. Incident where unauthorized access to data occurs
- 7. Fraudulent emails or messages to steal credentials
- 8. Hostile action aimed at exploiting vulnerabilities
Down
- 1. Organization behind the ATT&CK framework for cyber threats.
- 2. Malware that encrypts files and demands payment
- 4. Intelligence gathered from publicly available sources
- 5. Network of compromised devices controlled remotely
- 6. Decoy system set up to lure attackers