Block 6 Cyber Chapter 2

123456789101112
Across
  1. 1. the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
  2. 5. malicious logic that is inserted into an executable file to be triggered at a later time
  3. 6. a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
  4. 8. an infiltration software that secretly monitors unsuspecting users
  5. 10. associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
  6. 11. self-contained malware that has the ability to copy itself without parasitically infecting the host code
  7. 12. an individual that utilizes cyber training to hack for the government or an ally
Down
  1. 2. a means and method used by hackers to retain access to a system or network
  2. 3. an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
  3. 4. an attack on a computer that exposes an undiscovered or unpatched vulnerability
  4. 7. the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
  5. 9. free computer software that contains advertisements