Across
- 1. Self Replicating malicious software
- 5. Ignoring the request
- 6. Too many mails at a time
- 9. The potential for negative consequences
- 10. A piece of code, or method that leverages a vulnerability) in H/W or S/W to gain unauthorized access or steal data.
- 11. An attacker capturing and inspecting data packets as they travel across a network to steal sensitive information
- 12. a criminal uses pre-compiled list of common words
- 13. cybercriminal impersonates a trusted entity
- 15. A broker who misuses data
Down
- 1. Destroy the data or assets
- 2. A malicious activity that seeks to damage/steal/gain unauthorized access to data
- 3. Use people skills to steal information
- 4. Weakness or security gaps in a system
- 7. Attract you will some benefit for their benefit
- 8. keep it as a secret
- 14. known as a wordlist, to guess a user's password for a website or system.
