Across
- 2. An attack that overwhelms a system with excessive traffic.
- 4. Software that secretly monitors user activity.
- 5. Malicious software disguised as legitimate to gain access to systems.
- 6. Malicious software that encrypts data and demands payment for decryption.
- 7. A program that records keystrokes to capture sensitive data.
- 8. A technique using deceptive emails to steal personal information.
- 9. Network of infected devices controlled remotely.
Down
- 1. Method of guessing passwords by trying many combinations.
- 2. An attack that alters the appearance of a website
- 3. Intercepting and analyzing network traffic to gather information.
