CyberQuiz

1234567891011121314
Across
  1. 6. Software that detects and removes malicious programs on a computer
  2. 9. Cyber attack attempting to discover a password or cryptographic key by trying all possible combinations
  3. 11. System designed to mimic a vulnerable resource to attract and monitor cyber attacks
  4. 12. Malware that encrypts user data, demanding payment for decryption
  5. 13. Secret or hidden access point in a system, often used to bypass normal authentication
  6. 14. Code or sequence of commands exploiting a system vulnerability for unauthorized access
Down
  1. 1. Activity where an attacker pretends to be someone else or manipulates information to appear from a trusted source
  2. 2. Cyber attack aiming to obtain sensitive information by posing as a trustworthy source
  3. 3. Weakness or flaw in a system that could be exploited for unauthorized access
  4. 4. A sequence of characters used for authentication to access a system or account
  5. 5. Hidden part of the internet associated with illicit activities and anonymity
  6. 7. Team Group of specialists simulating attacks on a system or network to identify vulnerabilities
  7. 8. Security system that monitors and controls network traffic
  8. 9. Team Defensive cybersecurity team responsible for protecting a system or network.
  9. 10. Network of compromised computers controlled by a single entity for malicious activities