Chapter 6 Advance Cyber

123456789101112131415161718192021222324
Across
  1. 4. Unpatched or outdated applications that create security holes.
  2. 6. An attack that compromises a website known to be frequented by a specific target group.
  3. 9. False information spread intentionally to deceive.
  4. 10. The social engineering tactic of creating a fabricated scenario to obtain information.
  5. 11. A network connected using physical cables, like Ethernet.
  6. 14. A threat delivered via an attachment, like a malicious PDF or DOC file.
  7. 16. Phishing conducted via SMS text message.
  8. 17. A potential physical threat vector, like a USB drive.
  9. 19. False information that is spread, regardless of the intent to deceive.
  10. 20. Registering a domain name very similar to a popular one, relying on user mistypes.
  11. 21. End-of-life (EOL) software that no longer receives security patches. (2 Words)
  12. 23. A network that uses radio waves, like Wi-Fi.
  13. 24. A short-range wireless protocol used for PANs (Personal Area Networks).
Down
  1. 1. A type of spam that embeds its message in a picture to evade text filters.
  2. 2. Network ports left accessible and running services, creating potential entry points.
  3. 3. Security software installed directly on an endpoint, like a laptop or PC.
  4. 5. An attack that mimics the look and feel of a legitimate company's logo, website, or email.
  5. 7. Security scanning performed remotely, without installing software on the target device.
  6. 8. A social engineering attack using email to trick a user into revealing credentials.
  7. 12. Phishing conducted over a voice call.
  8. 13. Unsolicited and unwanted bulk email.
  9. 15. The technical name for text messaging (Abbr: SMS).
  10. 18. An attack that targets a trusted third-party vendor to compromise the final target.
  11. 22. The medium used for a 'vishing' attack.