Cybersecurity
Across
- 3. An attack that attempts to make an online service unavailable by overwhelming it with traffic from multiple sources.
- 4. Attacker invents a scenario in order to convince the victim to give them data or money.
- 6. Software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
Down
- 1. Sending an email designed to trick the recipient into giving away personal information
- 2. Any malware that misleads users of its true intent.
- 5. Someone that gains unauthorised access to a device or sever.