Across
- 2. Fake or deceptive programs pretending to be legitimate.
- 5. Software designed to detect and remove malware.
- 6. Malware that locks files and demands payment.
- 11. Phishing carried out through voice calls.
- 12. Technique to rapidly change IP addresses of malicious hosts.
- 13. A person or entity trying to break into systems.
- 14. Phishing carried out through SMS messages.
- 15. Deceptive act intended to gain unlawful advantage.
Down
- 1. The reason why attackers launch cyberattacks.
- 3. The underlying network used to support cyberattacks.
- 4. Technique to send data secretly through another network.
- 7. A server used to hide the real identity of a user.
- 8. A network of compromised computers controlled remotely.
- 9. Fraudulent attempt to steal information via fake emails/websites.
- 10. Term used to describe harmful or hostile software/code.
