FBCYBERNET Chapter 12

123456789101112131415
Across
  1. 3. Famous malware that targeted Iranian nuclear facilities
  2. 6. Industrial control systems often targeted in attacks
  3. 7. WEB Anonymous part of the internet used for illicit activity
  4. 9. Software designed to damage or exploit systems
  5. 11. Politically motivated attacks using computers
  6. 13. Routing method used by TOR to hide identity
  7. 14. Malware that records activity like keystrokes
Down
  1. 1. Coordinated cyber operations by a nation-state
  2. 2. Long-term targeted cyber attack
  3. 4. False or misleading information spread intentionally
  4. 5. Network attack that floods a system with traffic
  5. 8. Secretly gathering information without detection (9)
  6. 10. Network of infected machines controlled remotely
  7. 12. Hidden malicious program disguised as legitimate software
  8. 15. Programmable device used in industrial systems