Silas
Across
- 2. An attack that alters the appearance of a website.
- 3. Malicious software that encrypts data and demands payment for decryption.
- 7. Malicious software disguised as legitimate to gain access to systems.
- 9. A program that records keystrokes to capture sensitive data.
- 10. A technique using deceptive emails to steal personal information.
Down
- 1. Network of infected devices controlled remotely.
- 4. Software that secretly monitors user activity.
- 5. Intercepting and analyzing network traffic to gather information.
- 6. Method of guessing passwords by trying many combinations.
- 8. An attack that overwhelms a system with excessive traffic.