Network Attack

12345678910
Across
  1. 2. A covert method of secretly intercepting data during sensitive transmissions
  2. 5. A self-replicating malware that spreads through networks in a rapid manner
  3. 8. A deceptive scheme using fraudulent emails to trick users into revealing sensitive information
  4. 9. A dangerous technique that exploits vulnerable systems by inserting malicious code
  5. 10. A devastating form of malware that locks files and demands a substantial payment for access
Down
  1. 1. A stealthy technique for capturing valuable network packets to gather information
  2. 3. A deceptive form of malware disguised as trustworthy software to trick users
  3. 4. A massive attack that floods a target with excessive traffic to disrupt service
  4. 6. A malicious tactic that disguises the attacker's identity as a legitimate source to gain unauthorized access
  5. 7. A destructive piece of code that attaches itself to innocent files and spreads