Cyber Security Unit-2 Puzzle

123456789101112131415
Across
  1. 2. Fake or deceptive programs pretending to be legitimate.
  2. 5. Software designed to detect and remove malware.
  3. 6. Malware that locks files and demands payment.
  4. 11. Phishing carried out through voice calls.
  5. 12. Technique to rapidly change IP addresses of malicious hosts.
  6. 13. A person or entity trying to break into systems.
  7. 14. Phishing carried out through SMS messages.
  8. 15. Deceptive act intended to gain unlawful advantage.
Down
  1. 1. The reason why attackers launch cyberattacks.
  2. 3. The underlying network used to support cyberattacks.
  3. 4. Technique to send data secretly through another network.
  4. 7. A server used to hide the real identity of a user.
  5. 8. A network of compromised computers controlled remotely.
  6. 9. Fraudulent attempt to steal information via fake emails/websites.
  7. 10. Term used to describe harmful or hostile software/code.