Cyber attacks

123456789101112131415
Across
  1. 2. malicious act of collecting and publishing and individuals private info
  2. 4. trying many passwords until one works
  3. 6. fake emails or messages that trick users into giving information
  4. 7. force trying many passwords until one works
  5. 11. malicious code that attaches to legitimate files
  6. 12. networks of infected devices controlled by an attacker
  7. 13. phishing via text messages
  8. 14. recoding keystrokes to steal credentials
  9. 15. a cyber-enabled attack that involves sending a SWAT team to unsuspecting victim
Down
  1. 1. displays unwanted ads, often tracking user behavior
  2. 3. malware disguised as legitimate software
  3. 5. pretending to be a trusted device by faking an IP address
  4. 8. encrypts files and demands payment
  5. 9. luring victims with something enticing
  6. 10. self replicating malware that spreads across networks
  7. 11. phishing via phone calls