Cybersecurity
Across
- 5. Observing someone's actions to gain information
- 6. Attempting to acquire sensitive information
- 9. Self-replicating malware
- 11. Malicious program disguised as legitimate software
- 12. Malicious software that blocks access to data
- 13. System designed to lure attackers
- 14. Unauthorized use of a computer for cryptocurrency mining
- 15. Unauthorized use of copyrighted material
- 18. To take advantage of a vulnerability
- 20. Disguising as another person or entity
- 24. Network of compromised computers
- 25. Malicious software
- 27. Redirecting users to a fake website
- 28. Phishing attack via SMS
- 30. Backup of data changed since last full backup
Down
- 1. Manipulating people to reveal information
- 2. Disaster recovery site with basic infrastructure
- 3. System for managing changes to software
- 4. Process of converting data into a code
- 7. Network of honeypots
- 8. Multi-factor authentication
- 10. Software that gathers information without consent
- 15. Harmful data delivered by malware
- 16. Disaster recovery site fully operational
- 17. Backup of data changed since last backup
- 19. Complete copy of all data
- 21. Pretend to be someone else
- 22. Attack that intercepts communication
- 23. Software that records keystrokes
- 26. Unauthorized access by following someone
- 29. Disaster recovery site with partial capabilities