Cybersecurity Crossword

12345678
Across
  1. 2. Any software designed intentionally to cause damage to a computer, server, or network.
  2. 5. A type of malware that encrypts your files and demands payment for their release.
  3. 7. Rubber Ducky devices often perform a ______ injection attack in order to run unauthorized commands.
  4. 8. An attacker sends a fake email pretending to be a trusted entity in a ______ attack.
Down
  1. 1. A ______ records each key pressed on a keyboard, often to steal passwords.
  2. 3. A process of converting information into ciphertext to prevent unauthorized access, usually applied in ransomware attacks.
  3. 4. Short range wireless technology used in wireless earbuds and smartwatches but can be hacked by also used by devices like Flipper Zero.
  4. 6. Artificial intelligence can create a ______, where someone’s face or voice is replaced or altered to appear realistic.