Across
- 2. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
- 5. network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
- 6. is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system
- 7. he fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Down
- 1. file, program, or piece of code that appears to be legitimate and safe, but is actually malware. Trojans are packaged and delivered inside legitimate software (hence their name), and they're often designed to spy on victims or steal data.
- 3. is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
- 4. involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.
