mod_2_crossword_puzzle

1234567891011121314151617181920212223242526272829
Across
  1. 3. Self-replicating malicious program spreading across networks
  2. 5. Gathering information without victim’s knowledge
  3. 8. Probing a network to confirm vulnerabilities
  4. 10. Attacks motivated by national interest
  5. 16. Manipulating people to reveal information
  6. 17. Known as “binning” or “skipping”
  7. 18. Searching trash for confidential data
  8. 20. Public Internet place used for crimes
  9. 22. Fake e-mails to steal personal data
  10. 23. Luring users to install malware
  11. 25. Software that monitors user activity
  12. 27. Attacks targeting governments or public systems
  13. 29. Pathway through which attacker gains access
Down
  1. 1. Follows victim physically before online harassment
  2. 2. Collecting data about target’s network and environment
  3. 4. Information gathering phase before an attack
  4. 6. Watching someone’s screen or keyboard
  5. 7. Software that records keystrokes secretly
  6. 9. Program disguised as legitimate software
  7. 11. Software to detect and remove viruses
  8. 12. Online harassment using ICT tools
  9. 13. Network of infected computers under remote control
  10. 14. Code that infects and damages files
  11. 15. Machine controlled by hacker via botnet
  12. 19. Identifying open ports, IPs, and weaknesses
  13. 21. Sneakware installed without user consent
  14. 24. Barrier that blocks unauthorized access
  15. 26. Malicious content delivered by attack vector
  16. 28. Denial of Service causing network disruption