Across
- 4. The final stage of the Cyber Kill Chain where the attacker achieves their ultimate goal, such as stealing data or deploying ransomware.
- 5. The act of listening in on a conversation or monitoring network traffic.
- 11. A type of attack that involves inserting harmful software into a system to cause damage, steal data, or disrupt operations.
- 12. The simple tactic of following closely behind a person who has just used their access card or PIN to gain physical access to a room or building.
- 13. A type of attack where the attacker is physically close to the target system.
- 14. A form of social engineering attack over Voice over IP (VoIP).
- 16. Deliberate attempts by hackers to breach the security of computers, networks, or systems to steal, alter, or destroy sensitive data.
- 17. A type of attack where the attacker does not make changes to the system but rather does such things as eavesdropping or monitoring data transmissions.
- 18. A type of attack that relies on persuading a person to reveal information.
- 19. Pretending to be a trusted person or entity to gain unauthorized access to information, systems, or resources.
- 20. A method to make a service or network unavailable by overwhelming it with traffic or resource requests.
Down
- 1. A method or technique that a hacker uses to gain access to a network in order to inject a "bad code".
- 2. A type of social media phishing where attackers impersonate customer support accounts or organizations on platforms like Twitter, Facebook, or Instagram to trick people into revealing their personal information.
- 3. A type of cybersecurity attack during which malicious actors send messages pretending to be a trusted person or entity.
- 6. A physical intrusion that involves modifying the data stream or attempting to gain unauthorized access.
- 7. Carried out through text messages (SMS), tricking victims into sharing personal information or clicking on harmful links.
- 8. The process of an attacker gathering information about a network for a future attack.
- 9. A specific type of spear phishing aimed at high-level executives or important individuals.
- 10. Attacks using backdoors introduced to hardware or software systems at the time of manufacture.
- 15. An attack from inside users, who use their access credentials and knowledge of the network to attack the target machines.
