Across
- 5. A type of software designed to protect against malware and other cyber threats.
- 7. A type of cyber attack that involves taking control of a computer or network and demanding payment for release.
- 8. A type of attack that bombards a network with traffic to bring it down.
- 9. A security system designed to prevent unauthorised access to a network.
- 12. A type of malware that encrypts files and demands payment to decrypt them.
- 13. A type of cyber attack that uses stolen login credentials to access a network.
- 14. Software designed to harm a computer or network.
- 15. A type of cyber attack that targets physical infrastructure, such as power plants or transportation systems.
- 16. A type of cyber attack that involves stealing sensitive information through a fake website or email.
- 17. A type of cyber attack that targets vulnerabilities in software.
- 19. The practice of accessing a computer network illegally.
Down
- 1. A type of cyber attack that involves manipulating a user into taking an action that harms the network's security.
- 2. A type of cyber attack that involves stealing sensitive information through an infected USB drive.
- 3. A type of malware that copies itself and spreads throughout a network.
- 4. A security process that requires two forms of authentication to access a network.
- 6. A type of malware that can spy on a computer user's activities.
- 7. A type of cyber attack that involves blocking access to a network until a ransom is paid.
- 10. A form of phishing that targets high-profile individuals.
- 11. A type of cyber attack that involves flooding a network with requests to disrupt its operation.
- 18. A type of social engineering attack that impersonates a trusted entity to steal information. type of cyber attack that targets vulnerabilities in software.