Across
- 3. Self-replicating malicious program spreading across networks
- 5. Gathering information without victim’s knowledge
- 8. Probing a network to confirm vulnerabilities
- 10. Attacks motivated by national interest
- 16. Manipulating people to reveal information
- 17. Known as “binning” or “skipping”
- 18. Searching trash for confidential data
- 20. Public Internet place used for crimes
- 22. Fake e-mails to steal personal data
- 23. Luring users to install malware
- 25. Software that monitors user activity
- 27. Attacks targeting governments or public systems
- 29. Pathway through which attacker gains access
Down
- 1. Follows victim physically before online harassment
- 2. Collecting data about target’s network and environment
- 4. Information gathering phase before an attack
- 6. Watching someone’s screen or keyboard
- 7. Software that records keystrokes secretly
- 9. Program disguised as legitimate software
- 11. Software to detect and remove viruses
- 12. Online harassment using ICT tools
- 13. Network of infected computers under remote control
- 14. Code that infects and damages files
- 15. Machine controlled by hacker via botnet
- 19. Identifying open ports, IPs, and weaknesses
- 21. Sneakware installed without user consent
- 24. Barrier that blocks unauthorized access
- 26. Malicious content delivered by attack vector
- 28. Denial of Service causing network disruption
