Nathaniel Cybersecurity Crossword

123456789101112131415
Across
  1. 4. a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source
  2. 5. malicious code that replicates by independently exploiting vulnerabilities in networks.
  3. 9. holds a computer system, or the data it contains, captive until the target makes a payment
  4. 10. an attacker requests personal information from a party in exchange for something, like a gift.
  5. 11. displays annoying pop-ups to generate revenue for its authors
  6. 14. non-technical means for a criminal to gather information on a target
  7. 15. malware that carries out malicious operations under the guise of a desired operation such as playing an online game
Down
  1. 1. software that enables a criminal to obtain information about a user’s computer activities.
  2. 2. phishing using voice communication technology
  3. 3. takes advantage of programming errors or design flaws to grant the criminal elevated access to network resources and data.
  4. 6. malicious software
  5. 7. This type of malware remains inactive until that trigger event happens.
  6. 8. program or code introduced by a criminal who has compromised a system.
  7. 12. modifies the operating system to create a backdoor.
  8. 13. malicious executable code attached to another executable file, such as a legitimate program.