Cybersecurity: Attach Vectors

123456789101112131415161718
Across
  1. 3. Worm to attack computerized control systems targeting Iranian nuclear facilities
  2. 6. A type of malicious software often hidden in a Trojan that records keystrokes.
  3. 9. The path or means by which an attacker gains unauthorized access to a network.
  4. 11. When a third party intercepts communications between two parties, compromising confidentiality.
  5. 14. The malicious action or additional malware delivered by a Trojan horse.
  6. 17. The primary tactic used by Trojans to trick users into running them.
  7. 18. Unlike viruses or worms a Trojan does not do this to itself.
Down
  1. 1. Distribution vector resembles that of a Trojan but it is not considered a Trojan
  2. 2. A weakness in a target that a threat seeks to exploit.
  3. 4. An attack where the hacker acts as a relay between two devices thinking they are talking to each other.
  4. 5. A means to access a computer system that bypasses its security mechanism.
  5. 7. A download that occurs automatically when a user visits an infected web page.
  6. 8. The psychological manipulation of people into performing actions like downloading malware.
  7. 10. Malware disguised as legitimate software to trick victims into downloading it.
  8. 12. Strategist behind the attack on the walled city of Troy
  9. 13. A legitimate website that has had malicious code loaded to it by a hacker.
  10. 15. Released in 1975 and considered world's first example of a Trojan attack
  11. 16. The aspect of data compromised when a man-in-the-middle attacker changes the data.