Across
- 1. the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
- 5. malicious logic that is inserted into an executable file to be triggered at a later time
- 6. a technology that tracks and records key strokes hoping to get sensitive information like usernames and passwords
- 8. an infiltration software that secretly monitors unsuspecting users
- 10. associated with individuals using hacking skills within the law to conduct security assessments and help find vulnerabilities
- 11. self-contained malware that has the ability to copy itself without parasitically infecting the host code
- 12. an individual that utilizes cyber training to hack for the government or an ally
Down
- 2. a means and method used by hackers to retain access to a system or network
- 3. an attempt to fraudulently acquire sensitive information such as user’s name, passwords, or credit card information by pretending to be a trustworthy entity in an electronic communication
- 4. an attack on a computer that exposes an undiscovered or unpatched vulnerability
- 7. the action taken by a nation-state or international organization to use and/or target computers and networks to achieve military objectives
- 9. free computer software that contains advertisements
