Cybersecurity: Attach Vectors
Across
- 3. Worm to attack computerized control systems targeting Iranian nuclear facilities
- 6. A type of malicious software often hidden in a Trojan that records keystrokes.
- 9. The path or means by which an attacker gains unauthorized access to a network.
- 11. When a third party intercepts communications between two parties, compromising confidentiality.
- 14. The malicious action or additional malware delivered by a Trojan horse.
- 17. The primary tactic used by Trojans to trick users into running them.
- 18. Unlike viruses or worms a Trojan does not do this to itself.
Down
- 1. Distribution vector resembles that of a Trojan but it is not considered a Trojan
- 2. A weakness in a target that a threat seeks to exploit.
- 4. An attack where the hacker acts as a relay between two devices thinking they are talking to each other.
- 5. A means to access a computer system that bypasses its security mechanism.
- 7. A download that occurs automatically when a user visits an infected web page.
- 8. The psychological manipulation of people into performing actions like downloading malware.
- 10. Malware disguised as legitimate software to trick victims into downloading it.
- 12. Strategist behind the attack on the walled city of Troy
- 13. A legitimate website that has had malicious code loaded to it by a hacker.
- 15. Released in 1975 and considered world's first example of a Trojan attack
- 16. The aspect of data compromised when a man-in-the-middle attacker changes the data.