Domain One Review
Across
- 6. Using voice calls to trick users into divulging information
- 8. A program that collects victim information prior to an attack
- 9. State-sponsored cyberattackers who are often among the most dangerous.
- 11. Cyberattackers who bring attention to various causes.
- 15. A type of attack that overwhelms a network or device with traffic
- 17. sending a message to a victim that is tailored to that victim's personal information
- 18. A type of attack that sees the attacker intercept data while it transmitting from customer to service provider
- 19. A program that infects other files to do damage.
- 20. An acronym for low-cost, easy-to-use devices that are often not hardened and make for good targets for cyberattacks
- 22. A DoS attack that uses a botnet to make responding to the attack much more difficult.
- 23. Criminals who carry out illegal activities that target or use computer equipment.
Down
- 1. Attacks that happen in the physical world (including natural disasters)
- 2. Cyberattackers who have elevated privileges and internal knowledge.
- 3. Technical controls are worthless without ____________ controls.
- 4. Using SMS messages to trick users into divulging information
- 5. Sending a message to a victim asking for information or action
- 7. An acronym for cyberattackers who break into environments and stay there for long periods of time.
- 10. A program that encrypts important files and demands a payment for a decryption key
- 12. Waiting for an authorized user to open a door and following behind
- 13. "New" hackers who have little hacking skills but large numbers.
- 14. A type of attack that targets the weakest link of any cybersecurity environment
- 16. A malicious program disguised as a useful program
- 21. A self-copying program that tries to spread on its own