Network Attack
Across
- 2. A covert method of secretly intercepting data during sensitive transmissions
- 5. A self-replicating malware that spreads through networks in a rapid manner
- 8. A deceptive scheme using fraudulent emails to trick users into revealing sensitive information
- 9. A dangerous technique that exploits vulnerable systems by inserting malicious code
- 10. A devastating form of malware that locks files and demands a substantial payment for access
Down
- 1. A stealthy technique for capturing valuable network packets to gather information
- 3. A deceptive form of malware disguised as trustworthy software to trick users
- 4. A massive attack that floods a target with excessive traffic to disrupt service
- 6. A malicious tactic that disguises the attacker's identity as a legitimate source to gain unauthorized access
- 7. A destructive piece of code that attaches itself to innocent files and spreads