FBCYBERNET Chapter 12
Across
- 3. Famous malware that targeted Iranian nuclear facilities
- 6. Industrial control systems often targeted in attacks
- 7. WEB Anonymous part of the internet used for illicit activity
- 9. Software designed to damage or exploit systems
- 11. Politically motivated attacks using computers
- 13. Routing method used by TOR to hide identity
- 14. Malware that records activity like keystrokes
Down
- 1. Coordinated cyber operations by a nation-state
- 2. Long-term targeted cyber attack
- 4. False or misleading information spread intentionally
- 5. Network attack that floods a system with traffic
- 8. Secretly gathering information without detection (9)
- 10. Network of infected machines controlled remotely
- 12. Hidden malicious program disguised as legitimate software
- 15. Programmable device used in industrial systems