Across
- 4. Cyber Attackers intercept communication illegally and steal sensitive data in transit
- 5. The computer system that is a host to the malware agent of the botnet or to the malware agent itself
- 6. A Security incident in which a malicious threat actor gains access to systems without authorization
- 7. The process of monitoring and capturing all data packets passing through a given network
- 8. The process of isolating a file suspected of being infected with a virus to prevent it from contaminating other files
- 9. A software program designed to take advantage of a flaw in a network, typically for malicious purposes
- 10. The action or process of spoiling the appearance of a website in a cyber attack
Down
- 1. A social engineering technique which cybercriminal use to disguises themselves as a known/trusted source
- 2. Related to information security, confidentiality is the opposite to _______
- 3. A cybersecurity strategy which allows only pre-approved or trusted users, entities, or actions to operate on a system or network